internet dangers

123456789101112131415
Across
  1. 3. any malware which misleads users of its true intent
  2. 4. a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
  3. 6. computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  4. 8. collection of instructions and data that tell the computer how to work
  5. 11. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  6. 12. social engineering attack often used to steal user data, including login credentials and credit card numbers
  7. 13. someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
  8. 14. computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself
  9. 15. attack will send multiple requests to the attacked web resource – with the aim of exceeding the website's capacity to handle multiple requests… and prevent the website from functioning correctly.
Down
  1. 1. computer worm first uncovered in 2010 and responsible for causing substantial damage to the nuclear program of Iran.
  2. 2. type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim's machine
  3. 5. malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
  4. 7. computer worm that infected over ten million Windows personal computers on and after 5 May 2000 when it started spreading as an email message with the subject line "ILOVEYOU"
  5. 9. software computer program used to prevent, detect, and remove malware
  6. 10. messages transmitted and received by digital computers through a network