cscw01

12345
Across
  1. 3. Unencrypted information.
  2. 5. A collection of computers compromised by malicious code and controlled across a network.
Down
  1. 1. Software that compromises the operation of a system by performing an unauthorized function or process.
  2. 2. The interdependent network of information technology infrastructures, that includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
  3. 4. A list of entities that are blocked or denied privileges or access.