Criminal Minds
Acronyms
Parts of the Whole
Potpourri Part Deux
Are You Ill?
100
someone who accesses a computer or network illegally
What is a hacker?
100
ROM
What is read only memory?
100
the point at which a peripheral attaches to or communicates with a system unit
What is a port?
100
malware that resides in active memory and replicates itself over a network to infect machines, using up system resources and possibly shutting down the system.
What is a worm?
200
someone who uses the Internet or network to destroy or damage computers for political reasons
What is a cyberterrorist?
200
CPU
What is Central Processing Unit?
200
supports two or more processors running programs at the same time
What is multi-processing?
200
technique used to configure a smartphone or Internet-capable tablet to act as a portable communication device that shares its Internet access with other computers and devices wirelessly
What is tethering?
200
a destructive program disguised as a real program, such as a screen saver
What is a trojan horse?
300
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information or other malicious action
What is a cracker?
300
PDF
What is Portable Document Format?
300
utility that detects and protects a personal computer from unauthorized intrusions
What is a personal firewall?
300
a number sign (#) followed by a keyword that describes and categorizes a Tweet
What is a hashtag?
300
potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission
What is a virus?
400
someone who has the same intent as a cracker but does not have the technical skills and knowledge.
What is a script kiddie?
400
URL
What is Uniform Resource Locator?
400
a series of instructions that tell the computer what to do and how to do it
What is a program?
400
another computer that screens all your incoming and outgoing messages
What is a proxy server?
400
compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider
What is a zombie?
500
someone who demands payment to stop an attack on an organizations technology infrastructure
What is a cyberextortionist?
500
ASCII
What is American Standard Code for Information Interchange?
500
case that contains and protects the motherboard, hard disk drive, memory, and other electronic components fo the computer from damage
What is the system unit?
500
program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device.
What is rootkit?
M
e
n
u