Networks
Malware
Hackers
Terms To Know
Cyberattacks
Privacy
Digital Footprint
Cyberbullying
Etc.
200

A computer or device that manages access to the centralized resources clients use to complete their tasks

What is a server?

200

Software that allows a user to obtain information about another’s computer activities

What is spyware?

200

Someone who uses a computer to gain access to systems or networks

What is a hacker?

200

A term that describes the digital environment in which computer networks communicate

What is 'cyber?'

200

This attack occurs when when an attacker sends fraudulent emails or text messages to deceive someone into revealing personal information

What is phishing?

200

The ability of individuals to control what is accessible to others online

What is internet privacy?

200

A trail of data created by a user through online activity

What is a digital footprint?

200

A form of online harassment that uses electronic communication to intimidate or threaten a person or group of people

What is cyberbullying?

200

A malicious attempt by a hacker to damage, steal, or destroy a computer network or system

What is a cyberattack?

300

A network device that requests access to some type of service to accomplish its task

What is a client?

300

A software application that produces copies of itself, inserts these copies into other software applications, and performs a malicious action when executed

What is a computer virus?

300

“Bad guy” who hacks into computer systems or networks with malicious intent

What is a black hat hacker?

300

Software designed to disrupt, damage, or gain unauthorized access to a computer system

What is malware?

300

A hacking tool that logs and saves every keystroke on a computing device

What is a keylogger?

300

A web browser privacy feature that prevents browsing history from being shared on a user’s device

What is incognito mode?

300

Data flowing between a user’s computer and the internet

What is online usage?

300

The use of electronic communications to harass or stalk another user

What is cyberstalking?

300

The act of performing penetration tests on a system or network in order to find and eliminate vulnerabilities to improve its security

What is ethical hacking?
400

The process of splitting a large message into smaller and more easily transmissible units

What is packet switching?

400

Malware that blocks access to a computer system until a payment is made

What is ransomware?

400

“Good guy” who uses hacking skills for ethical and legal purposes

What is a white hat hacker?

400

The virtual environment that allows the many forms of digital technology to communicate with each other via the Internet

What is cyberspace?

400

This cyberattack occurs when a hacker overloads a system, resource, or service with targeted requests in order to disrupt or disable it

What is a Denial of Service (DoS) attack?

400

Small text files created by a web browser to store information

What are computer cookies?

400

Descriptive data that contains information about other data

What is metadata?

400

Someone who uses the internet to cause harm to a victim

What is a cyber predator?

400

A piece of software that looks innocent or legitimate but performs malicious actions once executed or downloaded

What is a trojan?

500

A network device that provides a connection through which it relays information to other network devices

What is a node?

500

A standalone self-replicating software application that invades computers on a network and performs a destructive action

What is a worm?

500

“Neutral guy” who exploits systems illegally but for personal enjoyment rather than with malicious intent

What is a grey hat hacker?

500

The collection of technologies, tools, approaches, guidelines, and practices designed to protect networks, devices, and data

What is cybersecurity?

500

This cyberattack occurs when an unauthorized user takes over an active communication session

What is session hijacking?

500

This network encrypts traffic from a public device to a private network on the Internet

What is a virtual private network (VPN)?

500

A collection of data that describes an entity

What is an online reputation?

500

Harassment targeted toward an individual that relies on the engagement of other users to provoke the victim

What is cyber trolling?

500

The two types of cyberattacks

What are Computer as Target and Computer as Tool?

M
e
n
u