Security - Firewalls & Proxy Servers

12345678910
Across
  1. 2. A _____________is the most common type of malware which can execute itself and spread by infecting other programs or files.
  2. 5. A_____________can self-replicate without a host program and typically spreads without any human interaction or directives from the malware authors.
  3. 8. A firewall consists of both _________ and software
  4. 9. _______________ also called system monitors, are used to see nearly everything a user does on their computer.
  5. 10. _____________attacks are where emails disguised as legitimate messages contain malicious links or attachments.
Down
  1. 1. A proxy server can make access to web pages _________
  2. 3. ________________is designed to infect a user's system and encrypt the data.
  3. 4. Software that is a security threat and can harm computer files is called _________
  4. 6. Proxy servers and firewalls improve network __________
  5. 7. a_____________ is designed to appear as a legitimate program in order to gain access to a system.