Across
- 4. A course of action, guiding principle, or procedure considered expedient, prudent, or advantageous.
- 7. A computer overtaken by a hacker and used to perform malicious tasks.
- 8. is a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.
- 10. A security tool that protects an individual computer or even an entire network from unauthorized attempts to access your system.
Down
- 1. A form of spyware that enters your computer from an Internet download.
- 2. A new term for spam messages being sent to instant message addresses.
- 3. Forging an e-mail or instant message address to make it appear as if it came from someone or somewhere other than the true source.
- 5. The transfer of data from one computer (or server) to another computer.
- 6. A person who enjoys exploring the details of computers and how to stretch their capabilities.
- 9. A violation or infraction, as of a law, a legal obligation, or a promise.
