A | B |
Cyper-stalking/bullying | Cybercrime involves harassment |
Phishing | emails trick users to giving passwords/info |
Computer Fraud | using computer to cheat people out of money |
Pharming | redirects you to a phony website to get personal info |
clickjacking | malware that post unwanted links on social media pages |
white hats | Hackers hired to look for holes in co. software |
grey hats | hackers who enjoy cracking software but do no harm |
black hats | hackers who hack to be malicious |
Hacktivism | Hacking to make a political statement |
Cyberterorism | Hacks government networks for political reasons |
Denial-of-Service attack | Cripples a network by overloading it with requests |
Botnet | Network of computer zombies |
Administrator | a user account that allows changes to system |
Save passwords | 8 char/special char/upper/lower case etc. |
Virus Program | A program that uses host files to infect |
Router | Device that networks like a firewall |
AUP | Acceptable User Policy |
https | the site is safe for money transactions |
User levels on an account | Standard/Admin/Guest |
Antivirus | software that protects your computer |
Downside of security suite | Decreases system performance |
Encryption | Converts plain text into cipher text |
SSID | another name for wireless not WiFi |
Worms | infects computers and self replicates |
SPAM | unsolicited mass emails that can carry viruses |
Cookies | text files that collect info unknown to you |
SPIM | unwanted text messages |
Virus Programs | host files are used to infect and delete files |
Keyloggers | Software that records key strokes |
FBI/ATF/US Postal | government group that investigates cybercrimes |
iC3 | groups created to make it east to report crimes |
Computer Fraud/Abuse Act | law that makes it a crime to access classified info |
Rootkit | programs that hyjack your system undetected |