Type of unwanted software installed without your consent.
What is malware?
Criminals that use malevolent software on computers and internet to commit illegal activities
What is a black hat hacker?
Legitimate software that monitors your online activity.
What is spyware?
Disinformation published online to deceive or mislead
What is fake news?
Using another persons personal details for fraudulent purposes.
What is identity theft?
A destructive program that masquerades itself as a benign file or application
What is a Trojan Horse
A large network of compromised computers
What is a botnet?
criminal activities involving computes and the internet
What is cybercrime?
Posting offensive content online with the intent to cause arguments
What is flaming?
Software that detects keystrokes and mouse clicks on your computer
What is a keylogger?
Unsolicited bulk emails
What is junk mail?
Harmful software designed to spread from one computer to another.
What is a virus?
Digital security expert hired to hack a system to identify potential security issues.
What is a white hat / ethical hacker?
Distribution of a story that is not true on social media sites
What is a hoax?
Use of software without purchasing it.
What is piracy?
Unwanted program installed with a downloaded application without consent or knowledge.
What is a barnacle?
Self-replicating program found on a network. Sends copies of itself to other computers on the same network.
What is a worm?
When a number of infected computers perform simultaneous requests on the samewebsite to overwhelm the server to the point of crashing it.
What is DDos / Dos?
Manipulating someone into revealing confidential information through a series of personal questions
Gathering someone's personal details through the use of convincing emails and short messages.
What is phishing?
Evocative text or shocking imagery encouraging you to click on it.
What is clickbait?
Ongoing harassment, ridiculing or threatening messages on electronic devices.
What is cyberbullying
Registering a domain name without the actual intent to use the domain.
what is cybersquatting?
Gathering personal information from a source that seems to be legitimate.
What is spear phishing?
Gathering information about a person in a position of power
What is whaling?