Java Games: Flashcards, matching, concentration, and word search.

Code Studio - Unit 8 - Cybersecurity/Malware - Terms - Need 5 minutes for 1 P-Point

Code Studio Reference:
https://studio.code.org/s/csp10-2022/lessons/6/levels/3?section_id=4158882&user_id=93888516

AB
keyloggingThe use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
phishingA technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
malware /malicious softwareSoftware typically installed on a website by cybercriminals that can spread viruses, steal personal or financial data and even hijack computers.
bugsA type of error, flaw or failure that produces an undesirable or unexpected result; typically exists in a website's source code and can cause a wide range of damage.
virusA piece of code that is loaded onto your website or computer without your knowledge; it can easily multiply and be transmitted as an attachment or file.
trojan horseMuch like the myth, this disguises itself as a normal file and tricks users into downloading it; consequently installing malware
adwareA type of malware that automatically displays unwanted advertisements for which when clicked could redirect you to a malicious site
wormsRelies on security failures to replicate and spread itself to to other computers; often hidden in attachments and will consume bandwidth and overload a web server.
botsA software program created to perform specific tasks; can send spam or be used in a DDOS attack to bring down an entire website.
ransomwareDenies access to your files and demands payment through Bitcoin in order for access to be granted again.
spywareA type of malware that functions on spying on a user's activity; involves monitoring a user's activity such as keystrokes and more.
spear phishingA type of phishing campaign that targets a specific person or group and often will include information known to be of interest to the target, such as current events or financial documents. (note: do not put "phishing").
fishingthe activity of catching fish, either for food or as a sport.
DDOSDistributed Denial of Service Attack


Computer/Technology/Business/Law/CTE Teacher
CA

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities