1. F F กF ก
1. ก F
1. Hacker
2. Cracker
3. Threats
4. Denial of Service
5. Misuse
6. Disclosure
7. Modification
8. Destruction
9. Malware
10. Virus Computer
11. Trojan
12. Worm
13. Hoax
14. Spyware
15. Spam mail
16. Social Engineering
17. Phishing
18. WEP
19. WPA
20. Security
2. F ก
3. กก PDCA ก F
4. ก F F F กF F F
5. ก ก F ก F F
6. ก ก F F F ก ก F F ก ก F
F ก Fก F F