ict henry morris

12345678910
Across
  1. 4. any program designed to disrupt, damage, or gain unauthorized access to a computer system.
  2. 5. a security professional who operates between white hat (ethical) and black hat (malicious) hackers
  3. 7. a type of standalone, self-replicating malware that spreads automatically across networks without human intervention.
  4. 8. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  5. 9. a network security system that acts as a barrier between a trusted internal network (or computer) and untrusted external networks, such as the internet.
  6. 10. the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information
Down
  1. 1. an automatic legal right protecting original creative works—such as literature, art, music, films, and software—once they are expressed in a tangible form. I
  2. 2. malicious software (malware) disguised as legitimate, harmless software, designed to trick users into installing it.
  3. 3. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  4. 6. the practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.