malware

1234567891011
Across
  1. 5. person who illegally gains access to and
  2. 7. program that copies itself to other computers across the internet is called a worm.
  3. 9. This will help protect your system from the threat
  4. 10. files for known virus signatures
  5. 11. Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.
Down
  1. 1. are used to check packets of data as they are received by a computer system from a network or the internet.
  2. 2. horse-This type of malicious software pretends to be a useful program while secretly performing another function, like spying on your activities.
  3. 3. virus software-It is important that your computer system uses anti-virus
  4. 4. tampers with information in a computer system.
  5. 6. small malicious program that can alter and delete files.
  6. 8. viruses. Common tasks carried out by anti-virus software