ILOVEYOU Virus
Across
- 4. Process after the virus attack
- 5. What the virus did to data
- 9. Method to prevent malicious emails
- 11. ILOVEYOU’s lasting impact on cybersecurity
- 17. Email provider impacted
- 18. Key strategy in the virus’s success
- 20. Scale of the ILOVEYOU virus impact
- 23. Email client targeted for spreading
- 26. Country where the virus originated
- 28. Language exploited in the attack
- 30. Alleged author of the virus
- 31. Self-replicating malware type
- 32. File included in the malicious email
- 33. How the virus moved between systems
- 34. Software designed to detect and remove threats
- 36. Mass email tactic used by the virus
- 37. Term for amateur hackers
- 39. Primary method of infection
- 41. Another name for the ILOVEYOU virus
- 44. UK government entity affected
- 46. Trickery used to deceive victims
- 47. Security measure against malware
- 48. Company whose software was affected
Down
- 1. The virus affected computers worldwide
- 2. Set of programming instructions
- 3. Impact of the virus on files
- 6. General term for harmful software
- 7. Fix used to prevent infection
- 8. Unauthorized system access
- 10. One of the virus’s creators
- 12. How some perceived the virus at first
- 13. Disguised malware that tricks users
- 14. Programming language used in the virus
- 15. Malicious software that spreads between computers
- 16. Windows component altered by the virus
- 19. Term for computers affected by malware
- 21. Investigated the virus attack
- 22. Industry responding to the attack
- 24. How the virus damaged files
- 25. US government organization affected
- 27. Characteristic of the ILOVEYOU virus
- 29. Effect on user files
- 35. Infamous computer worm from 2000
- 38. Operating system vulnerable to the virus
- 40. Microsoft’s email service affected
- 42. Malicious digital assault
- 43. Automation process exploited by the virus
- 45. Deceptive practice related to cybercrime
- 46. ILOVEYOU email subject line