Across
- 3. A computer program or a piece of code that is loaded onto your computer without your knowledge and run against your consent.
- 5. A virus that allows the attacker to control the infected users computer.
- 7. Worm A Trojan horse that opens a backdoor in the computer which then allows it to be remotely controlled, while also installing a rootkit that hides the malicious program.
- 9. Creates a backdoor on your computer that gives malicious users access to your system.
- 10. Information stored on a computer that is exchanged between two users over telecommunications.
- 11. A worm that could disrupt private and public services.
- 13. An attack that occurs when multiple systems flood the bandwidth or resources of a targeted system.
- 14. Cause harm to their host networks by consuming bandwidth and overloading web servers.
- 15. A very damaging computer virus that affected Microsoft Windows-based computers.
Down
- 1. The first virus to cause damage in the real world, designed to damage machinery.
- 2. An attempt by a person or a group of people to obtain sensitive information.
- 4. A collection of data or computer instructions that tell the computer how to work.
- 6. A virus that is sent through email with the attachment labeled "I love you".
- 8. A macro virus that is spread through email attachments.
- 12. A Trojan malware which has the ability to modify the master Boot Record (MBR) of your computer.
