Attempts to make an online service, like a web site, unavailable by overwhelming it with a flood of traffic from a team of computers.
What is a DDos attack?
100
A small, portable data storage device that is used to store, back up and transfer computer files.
What is a USB drive?
100
Computer programs that can block, detect and remove viruses and other malware.
What is antivirus software?
100
Unsolicited emails sent to many address, mostly to make money through advertising or identity theft.
What is spam?
100
A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program?
What is a patch/software update?
200
Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn't be achieved with a single computer.
What is a botnet?
200
A type of connection between devices that can exchange information and power supply.
What is a USB port?
200
Software designed to block malware from entering protected computers or networks.
What is a firewall?
200
A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
What is a vulnerability?
200
Adds an extra step to a login procedure to confirm you are who you say you are.
What is 2FA/two factor authentication?
300
A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
What is a computer virus?
300
A computer or computer program that provides specific services on a network, such as directing e-mail or serving up web pages.
What is a server?
300
A type of malicious software designed to block access to a computer system or data until money is paid.
What is ransomware?
300
The amount of data that can pass through a network or part of a network per second.
What is bandwidth?
300
The process of using codes to make readable information unreadable. The information then cannot be read without a secret key.
What is encryption?
400
Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
What is malware?
400
Extra copies of computer files that can be used to restore files that are lost or damaged.
What are backups/backup files?
400
The programs and other operating information used by a computer
What is software?
400
The art of manipulating people into performing actions or giving up information.
What is social engineering?
400
A "white hat" hacker, someone who looks for and tests vulnerabilities in a system so that they can be corrected.
What is a pen tester?
500
Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
What is phishing?
500
Two or more interconnected devices that can exchange data.
What is a network/computer network?
500
A program that records every key struck on a keyboard and sends that information to an attacker.
What is a keylogger?
500
A "malware" attack that actually doesn't use any malware files?
What is "fileless malware"?
500
A method used to add security and privacy to public and private networks, like WiFi Hotspots and the Internet.