Cyber Security #5

1234567
Across
  1. 3. Computer program that can run independently, propagate a complete working version of itself onto another host network and consume computer resources destructively.
  2. 4. Malicious logic, often self-replicating. Cannot run by itself.
  3. 6. Network based on internet technology that an organization uses for its own internal, and usually private purposes that is closed to outsiders.
  4. 7. The need to ensure that people involved with the company, emplyess ETC are protected from harm.
Down
  1. 1. A potential for violation of security, exist when there is a circumstance, capability, action, or event that could breach security and caise harm.
  2. 2. What you are when using a computer or service.Person, organization entity that has access to a system authorized or not.
  3. 5. A term to describe connecting multiple seperate networks together.