This is a computer program that spreads or self-replicates and requires user interaction to activate.
What is a virus?
Facebook and Twitter are two examples of these that are used by UCO to connect with students
What are social networking websites?
This type of cyberattack uses social engineering tactics to trick people into revealing sensitive information, such as passwords or credit card numbers.
What is phishing?
A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. They can have helpers or add-on functions incorporated by using interpreters to read the additional instructions and provide different web content types. Internet Explorer, Firefox and Safari are examples of these.
What is a browser?
This type of security assessment involves testing the security of a system or network by simulating a real-world attack.
What is a penetration test?
Any combination of your name, your home address or phone number, credit card or account numbers or social security number.
What is PII? (or Personally Identifiable Information)
Something you should do on a regular basis to ensure you can restore your computer to a previous state if something goes wrong.
What is backup your computer/data?
This type of cybersecurity control is used to restrict access to a system or network to authorized users.
What is access control?
Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.
What is insider threat?
This type of cyberattack uses a botnet to generate a large amount of traffic to a website or server, causing it to become unavailable.
What is a denial-of-service (DoS) attack?