ILOVEYOU Virus

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 4. Process after the virus attack
  2. 5. What the virus did to data
  3. 9. Method to prevent malicious emails
  4. 11. ILOVEYOU’s lasting impact on cybersecurity
  5. 17. Email provider impacted
  6. 18. Key strategy in the virus’s success
  7. 20. Scale of the ILOVEYOU virus impact
  8. 23. Email client targeted for spreading
  9. 26. Country where the virus originated
  10. 28. Language exploited in the attack
  11. 30. Alleged author of the virus
  12. 31. Self-replicating malware type
  13. 32. File included in the malicious email
  14. 33. How the virus moved between systems
  15. 34. Software designed to detect and remove threats
  16. 36. Mass email tactic used by the virus
  17. 37. Term for amateur hackers
  18. 39. Primary method of infection
  19. 41. Another name for the ILOVEYOU virus
  20. 44. UK government entity affected
  21. 46. Trickery used to deceive victims
  22. 47. Security measure against malware
  23. 48. Company whose software was affected
Down
  1. 1. The virus affected computers worldwide
  2. 2. Set of programming instructions
  3. 3. Impact of the virus on files
  4. 6. General term for harmful software
  5. 7. Fix used to prevent infection
  6. 8. Unauthorized system access
  7. 10. One of the virus’s creators
  8. 12. How some perceived the virus at first
  9. 13. Disguised malware that tricks users
  10. 14. Programming language used in the virus
  11. 15. Malicious software that spreads between computers
  12. 16. Windows component altered by the virus
  13. 19. Term for computers affected by malware
  14. 21. Investigated the virus attack
  15. 22. Industry responding to the attack
  16. 24. How the virus damaged files
  17. 25. US government organization affected
  18. 27. Characteristic of the ILOVEYOU virus
  19. 29. Effect on user files
  20. 35. Infamous computer worm from 2000
  21. 38. Operating system vulnerable to the virus
  22. 40. Microsoft’s email service affected
  23. 42. Malicious digital assault
  24. 43. Automation process exploited by the virus
  25. 45. Deceptive practice related to cybercrime
  26. 46. ILOVEYOU email subject line