Across
- 2. the act of taking over other electronics
- 4. the amount of time it takes to get a action done
- 6. the act of bullyng on the enternet
- 8. a two word virus named was a computer worm designed to exploit major flaws in Microsoft’s Internet Information Services web server.
- 10. the sexueal
- 12. the most dangerious virus first spotted in March 1999, spreading to the public via internet forums and emails offering free login credentials to adult websites.
- 14. what you need to sign in
- 17. worm was not just a worm that could replicate itself but also a Trojan horse, or malware disguised as a harmless program.
- 19. a facebook virus that was named after a snack made of flower egg and chocolate
- 21. a person employed to look after technical equipment or do practical work in a laboratory.
- 22. the "cells" of a webcite
- 24. theact of making electronics work
Down
- 1. another computer worm, targeted machines with Windows XP and Windows 2000 operating systems in 2004. It spread quickly through a vulnerability in the Local Security Authority Subsystem Service, which is responsible for managing user logins and credentials. The worm caused millions of PCs to blue screen and crash, which led many businesses to shut down their networks until the infection was dealt with.
- 3. was designed to encrypt files on infected computers and demand a ransom from its victims. However, the malware was unique in that it spread rapidly throughout computer networks by exploiting vulnerabilities in outdated Windows operating systems.
- 5. the location of informaiton
- 7. the worst malware in history, causing more than $38 billion worth of damages in 2004. Like Sobig, it was another type of mass mailing computer worm that stole email addresses from infected computers and sent itself to those addresses.
- 9. a virus named after the greek god of lightning
- 11. malware appeared in October 2001. It had the capability to exploit buggy Microsoft email clients and spread itself to everyone in a user’s Outlook address book.
- 13. computer worm discovered in 2010, spreading via corrupted USB drives and was predominantly used in cyber warfare. The malware targeted industrial control systems used to control nuclear power plants and other industrial facilities.
- 15. good hacker it is 2 words no space
- 16. bad hacker it is 2 words no space
- 18. also known as the love letter or the LoveBug virus, was first discovered in May 2000.
- 20. the way to get to a web sight
- 23. a bad program
- 25. most vaulable player
