Java Games: Flashcards, matching, concentration, and word search.

Cybersecurity Terminology

AB
CyberspaceThe online "world". A network of computers and communication systems, where organizations and individuals interact and exchange information.
CybersecurityThe steps that organizations and individuals take to protect their hardware, software and information from online criminal activity.
CookiesSmall data files that a website can install on your computer's hard drive. These files collect and store information about you and your activities on the site. Hackers can use cookies to steal your personal information.
EncryptionA way to secure information by scrambling it into a code that can be read only by authorized individuals.
FlamingPosting or sending offensive, verbally abusive messages on blogs, chat rooms, news groups or other online discussion forums. Deliberately trying to provoke someone online is generally a violation of the terms of service with your Internet service provider (ISP)
MalwareCreated to damage or illegally access a computer or network. Cybercriminals may attach malware to legitimate websites, downloads or attachments. When you visit the website, download the program or open the attachment, the malware can secretly install viruses, spyware or worms.
PatchSoftware you download to fix or update a computer program.
PhishingCybercriminals send you and unsolicited e-mail that pretends to come from a well-known company. The e-mail will have an official look and may include logos that appear to be legitimate. It may instruct you to "update" or "validate" your account information or face potential consequences or direct you to a fraudulent website with the "look and feel" like that of the targeted business. Legitimate businesses never request personal or confidential information via e-mail.
RouterA device that connects devices from two or more networks and finds the best path for sending information across those networks.
Smart CardA plastic card embedded with a microchip that can store and process information.
SpammingUnsolicited electronic communication considered junk e-mail. Commonly used for commercial advertising.
User AuthenticationValidating someone's identity before they can access sensitive information, generally by requiring a username, personal identification number (PIN) and/or passwords.
Wireless NetworkComputers and other devices that exchange information across radio waves, without cables.
CyberterrorismWhen foreign or domestic attackers use the Internet and the country's technological infrastructure to attack the nation's economy public works, communication systems and other vital interests.
Information WarfareWhen cybercriminals or cyberterrorists use the Internet to collect, use and manage information in pursuit of a strategic or competitive advantage over an opponent. Information warfare may include the spreading of propaganda or disinformation to manipulate an enemy or the general public.


Digital Application / Teen Living Instructor
Kempsville Middle School

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities