Hailey

123456789101112131415
Across
  1. 3. A computer program or a piece of code that is loaded onto your computer without your knowledge and run against your consent.
  2. 5. A virus that allows the attacker to control the infected users computer.
  3. 7. Worm A Trojan horse that opens a backdoor in the computer which then allows it to be remotely controlled, while also installing a rootkit that hides the malicious program.
  4. 9. Creates a backdoor on your computer that gives malicious users access to your system.
  5. 10. Information stored on a computer that is exchanged between two users over telecommunications.
  6. 11. A worm that could disrupt private and public services.
  7. 13. An attack that occurs when multiple systems flood the bandwidth or resources of a targeted system.
  8. 14. Cause harm to their host networks by consuming bandwidth and overloading web servers.
  9. 15. A very damaging computer virus that affected Microsoft Windows-based computers.
Down
  1. 1. The first virus to cause damage in the real world, designed to damage machinery.
  2. 2. An attempt by a person or a group of people to obtain sensitive information.
  3. 4. A collection of data or computer instructions that tell the computer how to work.
  4. 6. A virus that is sent through email with the attachment labeled "I love you".
  5. 8. A macro virus that is spread through email attachments.
  6. 12. A Trojan malware which has the ability to modify the master Boot Record (MBR) of your computer.