Java Games: Flashcards, matching, concentration, and word search.

Terms: Protecting Computer Systems, Data, and Users

Read the

AB
Black hatBad hacker who creates malicious programs to break into computers
FirewallHardware device or program that prevents unwanted access
PhishingE-mail attack or scam designed to gather information from a user
SpoofingWhen someone presents themselves as someone else in order to
SpywareA software program that monitors your computer usage without your knowledge.
Strong passwordPassword with at least eight characters containing a mixture of
VirusA piece of code that makes copies of itself.
Weak passwordPassword that contains anything that could be easy to guess,
WormA program that copies itself from one network to another.
NetizenA citizen of cyberspace; any person using the Internet to participate in online social communities.
MalwareA piece of malicious code developed to harm a computer or its data.
Security PatchA fix to a program to close a known security hole.
Trojan horseCamouflages itself as something harmles or desirable.
AdwareA program that delivers targeted advertising content to users often by gathering information from a user's computer about what that person does online and which websites are visited.


Taft HS

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities