Nathan
Across
- 2. A malware that allows a hacker to remote control a computer.
- 5. A virus that attaches itself to a message on the internet to infect a computer
- 6. A Cyber attack that's propose is to make network unavailable.
- 7. A Malware that infects a computer and takes over its control to a central server that commands and controls.
- 9. A protocol that provides the framework for a web browsing to work.
- 10. A group of computer connected to a common communication
- 12. A software that protects your computer from anything that may compromise your computer's information
- 14. A computer worm that poses as a love letter that infected over ten million window computers.
Down
- 1. Someone looking to the breach defenses of a computer or exploit a weak computer system.
- 3. A illegal practice that has emails pose as emails from companies to have you open to reveal personal information
- 4. A very damaging computer virus that targeted microsoft computers.
- 8. A program that is used to operate a computer to do a specific task.
- 11. A virus program that can self replicate without human assistances which in turn helps it spread faster into other networks.
- 13. A Malware or virus that disguises itself as a legit software.
- 15. A computer program that hijacks computer to then make copies of itself.