Across
- 3. A logic bomb lies dormant until a specific piece of program code is activated.
- 4. Usually attached to a document or spreadsheet and uses the macro functions or scripting language of the application.
- 7. Applies to program files and gives the user the right to run the program.
- 8. Malicious Programs which replicate themselves from system to system without the use of a host file.
Down
- 1. A computer program that is self replicating and can affect a computer.
- 2. User is prohibited from accessing the file in any way.
- 5. Assigned to each user to ensure that they may only access particular files or records according to their information needs.
- 6. Should be made so that lost data can be recovered easily.
