Basics
vocab
vocab cont.
hackers
100

What is a virus that self-replicates and spreads to other computers?

Worm

100

Includes websites that are intentionally hidden and only accessible through a special browser 

darknet

100

gives access to the anonymous websites on the darknet; stands for “the onion router” browser

TOR browser

100

act of circumventing or breaking past security boundaries

Hacking

200

Why is it important to use strong and unique passwords for online accounts?

To enhance security and prevent unauthorized access

200

Includes resources located on the internet, such as governmental databases, member-only sites, etc. That are not found with a typical search engine.

deep web

200

slang term used to describe an individual who uses premade tools to perform their attacks

Script Kiddie

200

ethical and law-abiding

White hack hacker

300

How can you identify phishing emails and protect yourself from phishing attacks?

By checking sender's email address, avoiding clicking on suspicious links, and verifying requests for sensitive information

300

includes websites and resources that can be located and accessed using a standard web browser, like chrome. 

The Internet

300

offers rewards for flaws and vulnerabilities found in their program

Bug-Bounty Program

300

operates outside the law

Black hat hacker

400

Define two-factor authentication and explain why it is more secure than single-factor authentication

two-factor authentication requires two forms of verification to access an account, making it harder for unauthorized users to gain access

400

connection involves data being rerouted through many computers before you are delivered to your destination

Onion Network

400

malicious software code that is unleashed and attempts to perform its destructive content

Virus

400

do no harm, but do not ask for permission

Gray hat hacker

500

What are common types of cyber threats that individuals and organizations face?

Malware, phishing, ransomware, DDoS attacks, etc.

500

Aim is to target and harm companies or individuals with whom they have a fundamental disagreement

Hacktivism

500

hacking into a phone system

Phreaking
500

avenue or path hacker uses to commit the attack

Attack Vector