ALL THE TOOLS WE USE AND ACTIONS WE TAKE TO KEEP COMPUTERS SAFE
WHAT IS CYBERSECURITY?
TERM FOR ANY SOFTWARE THAT IS INTENTIONALLY DESIGNED TO CAUSE HARM OR DO ILLEGAL AND UNETHICAL ACTIVITIES
WHAT IS MALWARE?
THIS LIST WAS CREATED IN 1992 BY THE COMPUTER ETHICS INSTITUTE TO GUIDE RESPONSIBLE BEHAVIOR ONLINE
WHAT ARE
THE 10 COMMANDMENTS OF COMPUTER ETHICS?
THIEVES THAT SIFT THROUGH GARBAGE TO FIND AND ACCESS PERSONAL INFORMATION
WHAT ARE
DUMPSTER DIVERS?
THE TOOL FILTERS INCOMING DATA TO PROTECT A NETWORK FROM ATTACK
WHAT IS
A FIREWALL?
A MOUSE, A KEYBOARD, AND A MICROPHONE ARE ALL TYPES OF THESE
WHAT ARE
INPUT DEVICES?
THIS TYPE OF CYBER THREAT INVOLVES MANIPULATING PEOPLE INTO GIVING UP PERSONAL INFORMATION?
WHAT IS
SOCIAL ENGINEERING?
HEALTHCARE, ENERGY, FOOD & AGRICULTURE, AND FINANCIAL SERVICES ARE ALL INDUSTRIAL SYSTEMS VULNERABLE TO CYBERATTACKS
WHAT IS
CRITICAL INFRACTURE?
THE NAME FOR MALWARE THAT CAN INFECT AND SPREAD WITHOUT HUMAN ASSISTANCE
WHAT IS A WORM?
MANY OF TODAY’S YOUTH HAVE WITNESSED THIS FORM OF INAPPROPRIATE ONLINE BEHAVIOR
WHAT IS CYBERBULLYING?
HACKERS CREATE THESE USING STOLEN PERSONAL INFORMATION ON SOCIAL MEDIA
WHAT ARE
DUMMY PROFILES?
THIS PIECE OF HARDWARE MANAGES RESOURCES SHARED BY MULTIPLE USERS IN A NETWORK
WHAT IS
A SERVER?
CONTENT STORED ON THIS IS ERASED WHEN A COMPUTER IS SHUT OFF
WHAT IS
RAM? (RANDOM ACCESS MEMORY)
SMARTPHONES, SMART BULBS, AND BLUETOOTH SPEAKERS ARE ALL EXAMPLES OF THIS
WHAT ARE
IoT DEVICES?
A SEEMINGLY LEGITIMATE PROGRAM WITH A HIDDEN MALICIOUS FUNCTION
WHAT IS A TROJAN HORSE?
THE TERM FOR COMMONLY ACCEPTED RULES OF HOW TO BEHAVE ONLINE
WHAT IS NETIQUETTE?
THIS TERM IS USED FOR A PHOTO OR HEADLINE TAILORED TO GRAB ATTENTION
WHAT IS CLICKBAIT?
THIS DEVICE CONTROLS TRAFFIC WITHIN A NETWORK
WHAT IS A SWITCH?
THE OS COORDINATES AND CONNECTS THE SYSTEM’S _____ AND _____ RESOURCES SO THINGS PERFORM AND RESPOND PREDICTABLY FOR THE USER
WHAT ARE HARDWARE AND SOFTWARE?
HEALTHCARE AND POWER GRIDS ARE EXAMPLES OF THESE SYSTEMS FREQUENTLY TARGETED BY HACKERS
WHAT ARE
CRITICAL INDUSTRIAL SYSTEMS?
A COMPROMISED COMPUTER UNDER THE CONTROL OF AN ATTACKER
WHAT IS A ZOMBIE?
(OR BOT)
THE CODE OF ACTING RESPONSIBLY WHEN USING COMPUTERS AND MOBILE DEVICES
WHAT IS
CYBER ETHICS?
AUTOMATIC UPDATES AND POP-UP BLOCKERS ARE EXAMPLES OF THIS
WHAT ARE BROWSER TOOLS?
A SOFTWARE PROGRAM DESIGNED TO PERFORM TASKS TO BENEFIT THE USER
WHAT IS AN APPLICATION?
IT CONNECTS THE CPU AND THE OPERATING SYSTEM SO A COMPUTER CAN BOOT UP
WHAT IS
THE BIOS?
IDEAL CAREER PATH FOR PROBLEM SOLVERS
WHAT IS
SECURITY ARCHITECT?
MALWARE THAT COLLECTS YOUR INFORMATION WITHOUT YOUR KNOWLEDGE OR CONSENT
WHAT IS SPYWARE?
EXPERTS WHO EVALUATE CYBERSECURITY THREATS, RISKS, AND PROBLEMS TO GUIDE ORGANIZATIONS IN PROVIDING PROTECTION SOLUTIONS
WHAT ARE
SECURITY CONSULTANTS?
THIS URL PREFIX INDICATES THAT A WEBSITE IS SECURE
WHAT IS
HTTPS?
DAILY DOUBLE!
THE USER INTERFACE OF A COMPUTER
WHAT IS
AN OPERATING SYSTEM?
IT MANAGES ALL THE COMPONENTS IN A COMPUTER SIMULTANEOUSLY
WHAT IS
THE CPU?