Aiden Baillargeon
Across
- 3. any malware which misleads users of its true intent
- 4. a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
- 6. computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- 8. collection of instructions and data that tell the computer how to work
- 11. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- 12. social engineering attack often used to steal user data, including login credentials and credit card numbers
- 13. someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
- 14. computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself
- 15. attack will send multiple requests to the attacked web resource – with the aim of exceeding the website's capacity to handle multiple requests… and prevent the website from functioning correctly.
Down
- 1. computer worm first uncovered in 2010 and responsible for causing substantial damage to the nuclear program of Iran.
- 2. type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim's machine
- 5. malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
- 7. computer worm that infected over ten million Windows personal computers on and after 5 May 2000 when it started spreading as an email message with the subject line "ILOVEYOU"
- 9. software computer program used to prevent, detect, and remove malware
- 10. messages transmitted and received by digital computers through a network