Across
- 2. horse This type of malicious software pretends to be a useful program while secretly performing another function
- 3. Misuse Act
- 4. people are allowed to access computers and
- 8. Firewalls are used to check packets of data as they are received by a computer system from a network or the internet.
- 9. the data on the computer system.
- 11. software It is important that your computer system uses anti-virus software.
Down
- 1. a person who illegally gains access to and sometimes tampers with information
- 2. Computer Misuse Act is a law that determines
- 5. Any message sent over a network can be intercepted.
- 6. Any software that covertly gathers user information
- 7. A small malicious program that can alter and delete files
- 10. a program that copies itself to othercomputers across the internet is called a worm.
