Java Games: Flashcards, matching, concentration, and word search.

OYS Ch 1, 2, & 3 Vocabulary

AB
NetizenA citizen of cyberspace (i.e the internet). Anyone who uses the internet
MalwareProgramming codes designed to harm a computer or it's data.
VirusesA programming code that copies itself to take up your memory and do harm to your computer and data. It attaches itself to a file. A self-replicating program.
WormsMalicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload computers and networks.
TrojansA program that camouflages itself as a friendly download, but when opened creates a backdoor that allows someone else to control your computer.
Bot ArmiesA large number of hacked computers controlled by a hacker to infect other computers.
Keystroke LoggersA program that keeps track of the computer user's keystrokes as they type in their computer.
SpywareA computer program that monitors your computer usage without your knowledge.
AdwareA program that delivers target advertising to a user based on information secretly gathered from the user's computer, such as websites visited and searches preformed.
ScarewareAlso known as Rouge Security Software. Applications that trick users into downloading malicious software disguised as computer security software.
RansomwareA program where a user's data or internet connection is encrypted or disabled unless the user pays a fee.
Rouge Security SoftwareAlso known as Scareware. Applications that trick users into downloading malicious software disguised as computer security software.
Security HolesAny flaw in a program that makes your computer vulnerable to attacks.
Security PatchA fix to a program to close a specific security hole, no longer making your computer vulnerable.
FirewallHardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network.
AntivirusA program that protects a computer from viruses.
Spyware ProtectionA program that protects a computer from spyware programs.
SignatureA unique pattern of bits that allow an antivirus program to identify viruses
Denial of Services (DoS)Flooding a website with lots of bogus connections denying other legitimate users access.
PayloadA subset of instructions attached to a virus to create havoc on one's computer.
MutationsAlso called variants. Slight changes to a virus so it will not be recognized by an antivirus program.
Script KiddieA low-talented hacker
Zero AttackAn attack from a not-yet-known virus where a patch has not yet been created.
Blended AttackA form of malware that includes many forms of attack (e.g. a virus, worm and trojan)
BotAlso called a zombie. A computer that was attacked by a hacker and can be controlled by the attacker remotely.
Bot NetworksA collection of Bots that can be used as a massive attack.
Social EngineeringThe study of human behavior to trick people into breaking their own security rules (e.g. opening an infected e-mail)
Drive by downloadsA program downloaded without you knowledge when you visit a website.
Data GrabbersSoftware that collects information about you, such as spyware, adware, and keyboard loggers.
End User Licensing AgreementsEULA's are the details you agree to when you install or download a program.
Peer to Peer NetworksP2P networks are sites that allow a user to share files with other people (e.g Napster, Kazaa, Limewire)
MalvertisingMalware that pops up on reputable sites.
Black Hat SEOUsing irrelevant keywords for your site so it will show up on nonrelated searches.



This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities