Java Games: Flashcards, matching, concentration, and word search.

CH5 Cyber Security Vocab

vocabulary terms over cyber security

AB
adwareprogram that displays an online advertisement in banner or pop-up window on webpages
backdoorprogram or set of instructions in program that allows users to bypass security controls when accessing program
botnetgroup of compromised computers or devices connected to network that are used to attack other networks
CAPTCHAprogram that displays an image containing series of distorted characters for user to enter to verify that user input is from human
crackerperson who accesses computer or network illegally with the intent of destroying data
crimewaresoftware used by cybercriminals
cybercrime0nline or Internet-based illegal acts such as distributing malicious software or committing identity theft
DoS attackan assault whose purpose is to disrupt computer access to an Internet service such as the web or email
DDoS attacktype of DoS attack in which zombie army is used to attack computers or computer networks
email spoofingspoofing that occurs when the sender's address or other components of an email header are altered so that it appears that the email message originated from different sender
face recognition systembiometric device that captures live face image and compares it with stored image to determine if the person is legitimate user
firewallhardware and/or software that protects network's resources from intrusion by users on another network
hackerany person who accesses computer or network illegally
malwareprograms that act without user's knowledge and deliberately alter the operations of computers and mobile devices. Also called malicious software
passwordprivate combination of characters associated with the user name that allows access to certain computer
payloaddestructive event or prank virus was created to deliver
phishingscam that tries to obtain financial or confidential information from Internet users
rootkitprogram that hides in computer or mobile device and allows someone from remote location to take full control of the computer or device
script kiddiecybercriminal who has the same intent as cracker but does not have the technical skills and knowledge
social engineeringscam in which perpetrators gain unauthorized access to or obtain confidential information by taking advantage of the trusting human nature of some victims and the naivety of others
spoofingtechnique intruders use to make their network or Internet transmission appear legitimate to victim computer or network
spywareprogram placed on computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online
Trojan horsedestructive program that hides within or looks like legitimate program
clickbaitscam in which an object that can be clicked on website
IP spoofingspoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source
iris recognition systembiometric device that uses iris recognition technology to read patterns in the iris of the eye
two-step verificationcomputer or mobile device uses two separate methods
viruspotentially damaging computer program that affects
wormmalware that resides in active memory and replicates itself over network to infect machines
zombiecompromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider
catphishingpretending to be someone else online by using false identities, particularly to pursue deceptive online romances, to gain money or to learn personal details
spear phishingemail-spoofing attack that sends messages from known or trusted sender to specific organization or individual
web filtering softwareprogram like LightSpeed that restricts access to certain online materials/websites
crackername given to hackers who break into computers for criminal gain
smishingphishing attack where mobile phone users receive text messages containing Web site hyperlink

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities