Across
- 5. person who illegally gains access to and
- 7. program that copies itself to other computers across the internet is called a worm.
- 9. This will help protect your system from the threat
- 10. files for known virus signatures
- 11. Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.
Down
- 1. are used to check packets of data as they are received by a computer system from a network or the internet.
- 2. horse-This type of malicious software pretends to be a useful program while secretly performing another function, like spying on your activities.
- 3. virus software-It is important that your computer system uses anti-virus
- 4. tampers with information in a computer system.
- 6. small malicious program that can alter and delete files.
- 8. viruses. Common tasks carried out by anti-virus software
