Any criminal action perpetrated primarily through the use of a computer is what?
Cybercrime
A program designed to detect and record digital information being transmitted over a network is called what?
Packet analyzer or sniffer
When hackers repeatedly make requests of a computer system with the intent to bring it down is called what?
Denial-of-Service (DoS) attack
A malicious computer program designed to spread from one computer to another, causing damage to data and system operations is called what?
Computer Virus
Software that has a malicious intent is called what?
Malware
The process by which someone uses personal information about someone else to assume the victim's identity for the purpose of defrauding another, is what?
Identity theft
A small segment of data that's sent over a network is called what?
Packet
A software toolkit used to find security weaknesses in computer systems is called what?
Exploit Kit
A virus that replicates itself into the master boot record of a hard drive, ensuring that it will be loaded into memory immediately is called what?
Boot-sector virus
Software that displays sponsored advertisements in a section of your browser window or as a pop-up box is called what?
Adware
Anyone who unlawfully breaks into a computer system is called a what?
Hacker
A program that appears to be something useful or desirable (such as a game or screensaver), but does something malicious in the background instead is called what?
Trojan horse
Virtual or not physical communication paths used by computer services (email, web, cloud storage) are called what?
Logical ports
A virus that is triggered by the passage of time or on a certain date.
Time bomb virus
Unwanted piggyback program that usually downloads with other software you install from the Internet and that runs in the background of your system is called what?
Spyware
A person who breaks into systems for non-malicious reasons, such as to test system security vulnerabilities is called a what?
White-hat hacker
A program that gives an outsider remote control over a computer is called a what?
Rootkit
A virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number of times is called what?
Logic bomb virus
A program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information is called what?
Keystroke logger
A person who breaks into systems merely to flaunt their expertise or to attempt to sell their services is called a what?
Gray-hat hacker
A computer that is controlled by a hacker who uses it to launch attacks on other computer systems is called what?
Zombie
DoS attacks from more than one zombie (sometimes thousands of zombies) at the same time is called what?
Distributed Denial-of-Service (DDoS) attack
A program that attempts to travel between systems through network connections to spread infections is called what?
Worm
Small text files that some websites automatically store on your hard drive when you visit them are called what?
Cookies