Across
- 3. Computer program that can run independently, propagate a complete working version of itself onto another host network and consume computer resources destructively.
- 4. Malicious logic, often self-replicating. Cannot run by itself.
- 6. Network based on internet technology that an organization uses for its own internal, and usually private purposes that is closed to outsiders.
- 7. The need to ensure that people involved with the company, emplyess ETC are protected from harm.
Down
- 1. A potential for violation of security, exist when there is a circumstance, capability, action, or event that could breach security and caise harm.
- 2. What you are when using a computer or service.Person, organization entity that has access to a system authorized or not.
- 5. A term to describe connecting multiple seperate networks together.
