The corporation that owns windows.
Microsoft
A program capable of reproducing itself and causing harm to files or other programs on the host computer
a Virus
The name of the main processing unit.
CPU
The name of a user with elevate permissions.
Administrator
The phrase hackers say when the get into a computer
"I'm in"
This “hidden feature” can be accessed by pressing ⊞+R.
the Run box
Software that infects computer networks and mobile devices to hold your data hostage until you send the attackers money.
Ransomware
The definition of RAM.
Random Access Memory
Programs like this include Firefox, Chrome, and Edge.
Web Browser
The color hackers wear
Black
The name of the built-in antivirus on Windows computers.
Windows Defender
An attacker goes to a local coffee shop and creates a wireless network using the shop’s name, hoping unsuspecting customers will log on.
Spoofing
The proper term for keyboards, mice, speakers, etc.
Peripherals
The visual part of the computer that we interact with.
GUI
The thing that hackers have to "bust" through
Firewall
The name of the categories that users are placed into the limit the amount of permissions they have.
Groups
An attacker impersonates a trusted person or corporation in an effort to get information from someone.
Phishing
The 2 main manufacturers of CPU's.
Intel and AMD
The elongated form of the "secpol" program that windows uses.
Security Policies
App that was temporarily banned for security reasons
TikTok
The highest level in the settings hierarchy in Windows.
Windows Registry
An attack that generates passwords based on commonly used combinations of words, numbers, and characters.
Brute Force
16:9
The triad of cyber CIA.
Confidentiality, Integrity, and Availability
Most accurate "Hacking show"
Mr.Robot