Java Games: Flashcards, matching, concentration, and word search.

Chapter 4 - Own Your Space

AB
HackerA programmer who breaks into someone else's computer system or data without permission
Cyber-TerroristA hacker or malware writer who uses a virus, worm, or coordinated computer attack to commit an act of terrorism against a political adversary
Ethical HackingUsing security tools to find security holes and to test and improve security
Computer ForensicsThe process of collecting digital evidence needed to identify and convict computer criminals
IP AddressA unique address that identifies where a computer is connected to the Internet. Internet Protocol
Good PasswordsThese are non-words created by combining things you can remember, such as your pet's name, your street address, and a symbol
BiometricsThe use of biological data, like fingerprints or retinal scans, for identification
RootkitA collection of tools that allows a hacker to gain full access to a vulnerable computer and hide his or her tracks
ServerA computer that "serves" other systems by providing high-speed access to specific types of data, like personal files or email accounts


Taft High School
Chicago, IL

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities