Computer science

123456789101112131415
Across
  1. 3. small program that is timed to perform an operation on a system.
  2. 8. attempting to break a cryptographic system and return the encrypted message to plaintext.
  3. 11. four bits
  4. 12. the practice of hiding messages
  5. 13. decrypted or unencrypted data
  6. 14. The Language of Computers
  7. 15. files that appear to be legitimate programs, but really contain malicious code.
Down
  1. 1. a precise set of instructions that tells programs how to scramble and unscramble data.
  2. 2. scrambling data so that it looks like babble
  3. 4. programs that create a mechanism for gaining access to a computer.
  4. 5. program that reproduces itself and can transport from system to system without attaching to a file.
  5. 6. groupings of eight bits
  6. 7. a program that attaches to a host file with the goal of installing itself on a system.
  7. 9. an attack that takes advantage of code flaws that have VERY recently been discovered
  8. 10. data that has been encrypted