Unwelcome Visitors
Persian Princes
Protect My Computer
Ware are my files
100

A program that is designed to harm a computer by deleting data, ruining files, and can spread secretly from one file to another

Virus

100

e-mail that is not wanted

SPAM

100

Measures taken to protect a computer or computer system against unauthorized access or attack

Cyber Security

100

Computer software that is provided, usually for free, that contains advertisements

Adware

200

A small self-contained and self-replicating computer program that invades computers on a network

Worm

200

A scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information

Phishing

200

Method in which a computer user is granted access only after successfully presenting two or more pieces of evidence

Multi-Factor Authentication

200

Software Designed to infiltrate or damage a computer system

Malware

300

A type of malicious software that is often disguised as legitimate software

Trojan

300

The act of obtaining of attempting to obtain otherwise secure data by conning and individual into revealing secure information

Social Engineering

300

A copy of data and/or applications stored for the event that data is lost

Backup

300

Computer software that secretly records information about the way you use your computer

Spyware

400

A computer that is controlled by a hacker who uses it to launch attacks on other computer systems

Zombie

400

When a hacker impersonates another device or user on a network

Spoofing

400

An integrated software designed to prevent unauthorized electronic access to a networked computer

Firewall

400

Software that threatens to publish the victims's data or perpetually block access to it unless a ransom is paid

Ransomware

M
e
n
u