Cybersecurity
World Wide Web
Bugs and Stuff
Methods of Attack
ACRONYMS
100

hackers are usually after two things

what is
data and money

100

the two types of routers

what is
wired and wireless

100

the term for malicious software

what is
malware

100

an attempt to get you to share personal information, usually by impersonating a trusted source

what is
social engineering

100

CPU

what is
central processing unit

200

the process of protecting a system against unintended or malicious changes or use

what is
cybersecurity

200

computers and users that access and use the network

what is
clients

200

offers rewards for flaws and vulnerabilities found in their program

what is a
bug-bounty program

200

emails that are fake and want you to click on a link to give you malware

what is
phishing

200

RAM

what is
random access memory

300

converting data into a format that can only be read by the holder of the decryption key

what is
encryption

300

a part of the internet that is not easily accessible to the average user

what is
the dark web

300

malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action

what is
ransomware

300

small piece of software that, when downloaded into your computer, will record every keystroke

what is
a keylogger

300

IOT

what is
internet of things

400

someone who hacks for a protest against the government

what is
a hacktivist

400

provides access to network resources to all the users of the network

what is
a server

400

malicious software code that is unleashed and attempts to perform its destructive content

what is
a virus

400

This attack is a hacking technique designed to flood your web server

What is
Denial of Service attack

400

NOS

what is
network operating system

500

all of the locations and methods that could constitute a security risk

what is
attack surface 

500

resources located on the internet that are not found with a typical search engine

what is
the deep web

500

a type of malware whose primary function is to self-replicate and infect other computers

what is
a worm

500

this type of attack tricks you into clicking on something different from what you thought you were clicking

what is
clickjacking

500

MAC

what is
media access control

M
e
n
u