an interdependent network of information technology infrastructures including the Internet, telecommunications networks, and computer systems.
What is, cyberspace.
According to the text, dams, railways, and power plants are considered ______.
infrastructures
A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation.
Virus
Someone overseas offering the victim a share in a large sum of money or a payment on the condition the victim helps them to transfer money out of their country.
Nigerian letter
Some of the most popular products advertised on the hidden wiki are ______.
drugs
______ is a global system of interconnected computer networks that are set up to exchange various types of data.
What is, The Internet?
According to General Michael Hayden, a cybersecurity knowledge gap exists between ______.
youthful generation and older generation
a person who uses programming skills to gain illegal access to a computer network or
hacker
the use of technology to harass, threaten, embarrass, or target another person
cyber-bullying
What is TOR?
The Onion Router, is free and open-source software for enabling anonymous communication.
3 layers of cyberspace
physical, information, logic.
the activity of converting data or information into code
encryption
Multimedia message services viruses target ______.
mobile devices
An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as ______
economic espionage
On the darknet, prices are listed in ______ and are shipped to remote addresses or P.O. boxes.
bitcoins
the acronym URL?
Uniform Resource Locator
______ are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the Internet.
Fire walls
A ______ malware is disguised as, or embedded within, legitimate software.
Trojan Horse
malicious computer software that interferes with
normal computer functions or sends personal data about the user to unauthorized parties over the internet
malware
Two of the most popular forms of cryptocurrency are ______.
bitcoins and ethereum
The ______ of the Internet might be a concern for parents regarding who their children may be talking to online.
anonymity/identity
Work-for-hire hackers who work for private security corporations are also referred to as ______.
red teams
______ viruses attach to the original code, changing the start-up information of the program.
Add-on
a network of maliciously installed bots running on multiple computers
botnet
The Darknet Silk Road runs like a black market ______ site for drugs, drug paraphernalia, and other goods and services.
ebay-type