Across
- 3. small program that is timed to perform an operation on a system.
- 8. attempting to break a cryptographic system and return the encrypted message to plaintext.
- 11. four bits
- 12. the practice of hiding messages
- 13. decrypted or unencrypted data
- 14. The Language of Computers
- 15. files that appear to be legitimate programs, but really contain malicious code.
Down
- 1. a precise set of instructions that tells programs how to scramble and unscramble data.
- 2. scrambling data so that it looks like babble
- 4. programs that create a mechanism for gaining access to a computer.
- 5. program that reproduces itself and can transport from system to system without attaching to a file.
- 6. groupings of eight bits
- 7. a program that attaches to a host file with the goal of installing itself on a system.
- 9. an attack that takes advantage of code flaws that have VERY recently been discovered
- 10. data that has been encrypted
