Java Games: Flashcards, matching, concentration, and word search.

Security -- Chapter 10

AB
Cyper-stalking/bullyingCybercrime involves harassment
Phishingemails trick users to giving passwords/info
Computer Fraudusing computer to cheat people out of money
Pharmingredirects you to a phony website to get personal info
clickjackingmalware that post unwanted links on social media pages
white hatsHackers hired to look for holes in co. software
grey hatshackers who enjoy cracking software but do no harm
black hatshackers who hack to be malicious
HacktivismHacking to make a political statement
CyberterorismHacks government networks for political reasons
Denial-of-Service attackCripples a network by overloading it with requests
BotnetNetwork of computer zombies
Administratora user account that allows changes to system
Save passwords8 char/special char/upper/lower case etc.
Virus ProgramA program that uses host files to infect
RouterDevice that networks like a firewall
AUPAcceptable User Policy
httpsthe site is safe for money transactions
User levels on an accountStandard/Admin/Guest
Antivirussoftware that protects your computer
Downside of security suiteDecreases system performance
EncryptionConverts plain text into cipher text
SSIDanother name for wireless not WiFi
Wormsinfects computers and self replicates
SPAMunsolicited mass emails that can carry viruses
Cookiestext files that collect info unknown to you
SPIMunwanted text messages
Virus Programshost files are used to infect and delete files
KeyloggersSoftware that records key strokes
FBI/ATF/US Postalgovernment group that investigates cybercrimes
iC3groups created to make it east to report crimes
Computer Fraud/Abuse Actlaw that makes it a crime to access classified info
Rootkitprograms that hyjack your system undetected


BCC adjuct
Brookdale Community College
Lincroft, NJ

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities