Computer Viruses

123456789101112131415
Across
  1. 1. Distributed Denial of Service. DDoS is a type of DOS attack where multiple compromised systems
  2. 5. standalone malware computer program that replicates itself in order to spread to other computers.
  3. 6. messages distributed by electronic means from one computer user to one or more recipients via a network.
  4. 9. the programs and other operating information used by a computer.
  5. 11. is a weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions within a computer system.
  6. 13. is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment.
  7. 14. a type of malware that is often disguised as legitimate software.
  8. 15. Browser is a software application for accessing information on the World Wide Web.
Down
  1. 2. to receive data from a remote system, typically a server such as a web server, an FTP server, an email server, or other similar systems
  2. 3. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  3. 4. is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
  4. 7. Software is a computer program used to prevent, detect, and remove malware.
  5. 8. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  6. 10. is a memorized secret used to confirm the identity of a user.
  7. 12. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.