Cybersecurity 2

12345
Across
  1. 3. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
  2. 5. A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
  1. 1. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system.
  2. 2. A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
  3. 4. A type of malicious software designed to block access to a computer system until a sum of money is paid.