networking concepts

123456789
Across
  1. 3. Using the internet to harass or intimidate someone.
  2. 4. A person who uses computers to gain unauthorized access to data.
  3. 6. A secret string of characters used to authenticate a user.
  4. 8. Software used to prevent, detect, and remove malicious programs.
Down
  1. 1. Software intended to damage or disable computers.
  2. 2. A security system that monitors and controls network traffic.
  3. 5. Small files stored on your browser to track site activity.
  4. 6. Fake emails or sites used to trick people into giving away passwords.
  5. 7. Unwanted or junk emails sent in bulk.
  6. 9. Theft involving personal information used for fraud.