Java Games: Flashcards, matching, concentration, and word search.

Own Your Space 1-2-7

AB
Security Patcha fix to a program to close a security hole
Netizena person using the Internet to participate in online social communities
Malwareprogramming code to harm a computer
Security Holea flaw in the computer program
Social Engineeringgeneral knowledge of human behavior to trick users
DoSdenial of service attack
Bota collection of remotely controlled by bots
Bota computer that has been compromised by a piece of code and controlled remotely
Blended Threata form of malware that includes more than one attack
Zero Day Attackan attack takes advantage of a security hole
Trojan Horsecamouflage itself as something harmless
Variantmutated form of a virus or worm
Script Kiddiea low-talent hacker
Worma standalone malware that copies itself across networks
Signaturea unnique pattern of bits usued to identify a virus
Virusa piece of code that copies itself
Phishingtrick users to reveal personal information
URLUniform Resource Locator
Mr Takumifirst teenager to be charged with phishing
Embedded Linka link or web address in an email or web page
Shortened URLusers shorten a long URL address
Phishing Targeta website a phisher is trying to get your information
Spoofed Sitefake web site
Fake Screena screen that looks line an actual company website


Chicago, IL

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities