Network Security

12345678
Across
  1. 3. A logic bomb lies dormant until a specific piece of program code is activated.
  2. 4. Usually attached to a document or spreadsheet and uses the macro functions or scripting language of the application.
  3. 7. Applies to program files and gives the user the right to run the program.
  4. 8. Malicious Programs which replicate themselves from system to system without the use of a host file.
Down
  1. 1. A computer program that is self replicating and can affect a computer.
  2. 2. User is prohibited from accessing the file in any way.
  3. 5. Assigned to each user to ensure that they may only access particular files or records according to their information needs.
  4. 6. Should be made so that lost data can be recovered easily.