Nathan

123456789101112131415
Across
  1. 2. A malware that allows a hacker to remote control a computer.
  2. 5. A virus that attaches itself to a message on the internet to infect a computer
  3. 6. A Cyber attack that's propose is to make network unavailable.
  4. 7. A Malware that infects a computer and takes over its control to a central server that commands and controls.
  5. 9. A protocol that provides the framework for a web browsing to work.
  6. 10. A group of computer connected to a common communication
  7. 12. A software that protects your computer from anything that may compromise your computer's information
  8. 14. A computer worm that poses as a love letter that infected over ten million window computers.
Down
  1. 1. Someone looking to the breach defenses of a computer or exploit a weak computer system.
  2. 3. A illegal practice that has emails pose as emails from companies to have you open to reveal personal information
  3. 4. A very damaging computer virus that targeted microsoft computers.
  4. 8. A program that is used to operate a computer to do a specific task.
  5. 11. A virus program that can self replicate without human assistances which in turn helps it spread faster into other networks.
  6. 13. A Malware or virus that disguises itself as a legit software.
  7. 15. A computer program that hijacks computer to then make copies of itself.