malware

1234567891011
Across
  1. 2. horse This type of malicious software pretends to be a useful program while secretly performing another function
  2. 3. Misuse Act
  3. 4. people are allowed to access computers and
  4. 8. Firewalls are used to check packets of data as they are received by a computer system from a network or the internet.
  5. 9. the data on the computer system.
  6. 11. software It is important that your computer system uses anti-virus software.
Down
  1. 1. a person who illegally gains access to and sometimes tampers with information
  2. 2. Computer Misuse Act is a law that determines
  3. 5. Any message sent over a network can be intercepted.
  4. 6. Any software that covertly gathers user information
  5. 7. A small malicious program that can alter and delete files
  6. 10. a program that copies itself to othercomputers across the internet is called a worm.