A group of computers that have been infected by malware and are in control of a malicious actor.
What Is Botnet?
Hiding something with phrases. Protecting data by using math models
What is Encryption?
An attacker is positioning himself between communicating parties and stealing and altering data.
What is a Man in the Middle Attack?
Malware that pretends to be a real program.
What is a Trojan Horse?
Unique characters that identify a computer over a network.
What is a IP Address?
The action of proving if you are who you say you are.
What is Authentication?
A program or file that is harmful to a computer and networks.
What is Malware?
Impersonating someone through or other communication methods.
What is Phishing?
Malware that spreads between computers.
What is a Virus?
(Bring Your Own Device)- Company making workers use their own personal devices.
What is BYOD?
A group of computers that share user information.
What is a Domain?
A Piece of software or a sequence of commands.
What is an Exploit?
Prevents users from accessing or using their system.
What is Ransomeware?
Tool to use to get information from a certain area.
What is a VPN?
An exercise where people try to find a weak spot in the system.
What is Pen-Testing?
Multiple systems flood bandwidth or resources of a system.
What is Ddos?
Security system that prevents traffic in a network.
What is a firewall?
Pretending be a known source when they are an unknown source
What is Spoofing?
The programs and other software information used by a computer.
What is Software?
Broad range of malicious activity through human interaction.
What is Social Engineering?
A system infiltrated, and data stolen.
What is a Data Breach?
Someone who illegally breaches and steals information and data from others.
What is a Hacker?
Malware that enters a computer and gathers info from the device and user.
What is Spyware?
The connection of servers and computers, software, databases.
What is the Cloud?
An AI generated video or image.
What is a Deepfake?