Across
- 4. virus file spread through ichat instant messaging. The file is called “latestpics.tgz”. The user should open the compressed file and open the executable inside the compressed file.
- 6. the machines, wiring, and other physical components of a computer or other electronic system.
- 7. counter to a virus
- 8. a person who uses computers to gain unauthorized access to data
- 10. a distributed denial-of-service (DDoS) attack is a malicious attempt to bring down networks
- 12. nitiated a distributed denial of service (DDoS) attack on the White House.
- 13. pretends to be something else but is still a virus
- 15. Many computer networks were unprepared for the attack, and as a result the virus brought down several important systems. The Bank of America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors.
- 17. One trigger caused the virus to begin a denial of service (DoS) attack starting Feb. 1, 2004. The second trigger commanded the virus to stop distributing itself on Feb. 12, 2004. Even after the virus stopped spreading, the backdoors created during the initial infections remained active [source: Symantec].
- 18. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 19. according to TruSecure CTO Peter Tippett,it only took 22 minutes for this attack to be at the top of most reported attacks
Down
- 1. messages distributed by electronic means from one computer user to one or more recipients via a network:
- 2. the programs and other operating information used by a computer:
- 3. ttacked computers through a Microsoft Windows vulnerability. Unlike other worms, it didn't spread through e-mail. Instead, once the virus infected a computer, it looked for other vulnerable systems. It contacted those systems and instructed
- 5. when someone send you a eamail asking for personal info
- 9. Once activated, the virus replicates itself and sends itself out to the top 50 people in the recipient's e-mail address book.
- 11. is a Trojan horse program. Its payload is another program, though not always the same one. Some versions of the Storm Worm turn computers into zombies or bots. As computers become infected, they become vulnerable to remote control by the person behind the attack.
- 14. infected a victim's computer through an e-mail message, replicated itself and then sent itself to people in the victim's address book.
- 16. virus initially traveled the Internet by e-mail, just like the Melissa virus.
