Across
- 3. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
- 5. A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
- 1. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system
- 2. A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage
- 4. A type of malicious software designed to block access to a computer system until a sum of money is paid