This type of malicious software demands money to unlock your files.
What is ransomware?
Criminal activity carried out using computers or the internet.
What is a cybercrime?
Fraudulent schemes conducted over the internet to steal money or personal information
What are internet scams?
These monitor and control incoming and outgoing network traffic based on security rules.
What are firewalls?
You should avoid sharing these with others, and keep them strong and unique to protect your accounts.
Whare are passwords?
This type of malware disguises itself as a legitimate software to trick users into installing it.
What is a Trojan?
A hacker who breaks into systems for malicious or illegal purpose?
What is a black hat hacker?
Unwanted bulk email message, often advertising or malicious.
What is spam?
This type of attack floods a website or server with traffic to shut it down.
What is a DDoS attack?
This type of software scans, detects, and removes malware from your computer.
What is antivirus software?
This type of malware spreads on its own without attaching to another file.
What is a worm?
The act of secretly stealing sensitive information from governments or companies online.
What is cyber espionage?
A scam that tricks users into revealing personal information through fake emails or websites.
What is phishing?
This tool encrypts internet traffic, and creates a secure tunnel between your device and the internet.
What is a VPN?
This is a safe, isolated area where suspicious or infected files are placed so they don't harm your system.
What is quarantine.
This malware attaches itself to files and spreads when the file is opened.
What is a virus?
A computer infected and controlled remotely by an attacker is called this.
What is a zombie?
Redirecting users from a legitimate website to a fake one without their knowledge is called this.
What is pharming?
Small files stored on your computer by websites to track activity.
Whare are cookies?
Strong passwords, firewalls, and regular software updates are examples of these measures that keep systems safe.
What is cybersecurity best practices.
This advances malware hides deep within a system to avoid detection and maintain access.
What is a rootkit?
A network of infected computers controlled by one attacker is called this.
What is a botnet?
Using digital platforms to harass or intimate someone repeatedly.
What is cyber bullying?
A specific pattern used by antivirus programs to identify known threats.
What is a virus signature?
The three core pillars of the CIA triad are designed to guide organizations in protecting digital assets.
What are Confidentiality, Integrity, and Accuracy?