Java Games: Flashcards, matching, concentration, and word search.

Own Your Space 1-2-6

AB
netizenperson using the Internet
malwareprogramming code to harm a computer
security holea flaw in the written computer program
security patcha fix to the security hole
virusa pice of code that makes copies of itself
signatureunique pattern to identify a virus
wormprogramming code that copies itself across a network
script kiddielow-talent hacker
variantmutated form of a virus or worm
zero day attackan attack that takes advantage of a hole
blended threatincludes more than one attack
botcomputer that is controlled remotely
bot networka collection of remotely controlled computers
DoSflood of Internet traffic users can't
social engineeringtrick users into breaking their security rules
cyberbullyingform of intimidation and harassment using electronic means


Chicago, IL

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities