Across
- 3. Unencrypted information.
- 5. A collection of computers compromised by malicious code and controlled across a network.
Down
- 1. Software that compromises the operation of a system by performing an unauthorized function or process.
- 2. The interdependent network of information technology infrastructures, that includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
- 4. A list of entities that are blocked or denied privileges or access.
