Across
- 3. software that is designed to protect a computer system/network.
- 4. A cyber attack that where you send so much traffic that it slows the system or eventually crash it.
- 5. decoy servers or computer systems that are set up to gather information on intruders or attackers of computer system/network.
- 7. protects data from unauthorized modification.
Down
- 1. a method that is used to test the security of the software
- 2. this is a security method for separating running programs on a computer system or network. it is often used to run untested code or programs from unknown sources such as suppliers, untrusted users, and websites.
- 6. malicious software which is capable of copying itself and corrupting computer systems and networks or destroying data.
