Across
- 3. COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
- 5. USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
- 7. MALICIOUS SOFTWARE.
- 9. SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
- 10. SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
Down
- 1. AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
- 2. A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.
- 4. SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
- 6. A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
- 8. MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.