Early computers were large, shared systems with no _____.
real security
What is Malware?
Malicious software
What is LAN?
Local Area Network
What is Amplitude?
the height or strength of awave — it measures how much energy thewave carries.
As time-sharing systems emerged, ______________ were introduced to separate user data.
passwords and user authentication
What is a Virus / Worm?
replicating code that corrupts files or spreads across networks.
What is MAN?
Metropolitan Area Network
What does Antivirus/Antimalware Software do?
Detect andremove malicious programs.
The rise of personal computers and early networks led to the first __________ programs.
first viruses and antivirus
What is a Trojan?
disguised as legitimate software but gives attackers access.
What is WAN?
Wide Area Network
What do Firewalls do?
Block unauthorized access to internal networks.
The internet boom created new threats like hacking, phishing, and malware;________ became essential.
firewalls and encryption
What is Ransomware?
encrypts files and demands payment to unlock them.
What is an example of LAN?
School computer lab, home Wi-Fi
What is a DDOS attack?
a cyberattack that floods a website, server, or network with an overwhelming amount of fake internet traffic, making it slow down or crash.
Focus has shifted to cloud security, AI-based threat detection, and ________ architecture to protect data in highly connected environments.
zero-trust
What does Rootkit / Bootkit do?
hide malicious processes deep in OS/boot chain.
What is an example of WAN?
The Internet itself is the biggest WAN
What were computers like in 1995?
Big, heavy
Dial-up (slow)
Manual, with disks