A computer or device that manages access to the centralized resources clients use to complete their tasks
What is a server?
Software that allows a user to obtain information about another’s computer activities
What is spyware?
Someone who uses a computer to gain access to systems or networks
What is a hacker?
A term that describes the digital environment in which computer networks communicate
What is 'cyber?'
This attack occurs when when an attacker sends fraudulent emails or text messages to deceive someone into revealing personal information
What is phishing?
The ability of individuals to control what is accessible to others online
What is internet privacy?
A trail of data created by a user through online activity
What is a digital footprint?
A form of online harassment that uses electronic communication to intimidate or threaten a person or group of people
What is cyberbullying?
A malicious attempt by a hacker to damage, steal, or destroy a computer network or system
What is a cyberattack?
A network device that requests access to some type of service to accomplish its task
What is a client?
A software application that produces copies of itself, inserts these copies into other software applications, and performs a malicious action when executed
What is a computer virus?
“Bad guy” who hacks into computer systems or networks with malicious intent
What is a black hat hacker?
Software designed to disrupt, damage, or gain unauthorized access to a computer system
What is malware?
A hacking tool that logs and saves every keystroke on a computing device
What is a keylogger?
A web browser privacy feature that prevents browsing history from being shared on a user’s device
What is incognito mode?
Data flowing between a user’s computer and the internet
What is online usage?
The use of electronic communications to harass or stalk another user
What is cyberstalking?
The act of performing penetration tests on a system or network in order to find and eliminate vulnerabilities to improve its security
The process of splitting a large message into smaller and more easily transmissible units
What is packet switching?
Malware that blocks access to a computer system until a payment is made
What is ransomware?
“Good guy” who uses hacking skills for ethical and legal purposes
What is a white hat hacker?
The virtual environment that allows the many forms of digital technology to communicate with each other via the Internet
What is cyberspace?
This cyberattack occurs when a hacker overloads a system, resource, or service with targeted requests in order to disrupt or disable it
What is a Denial of Service (DoS) attack?
Small text files created by a web browser to store information
What are computer cookies?
Descriptive data that contains information about other data
What is metadata?
Someone who uses the internet to cause harm to a victim
What is a cyber predator?
A piece of software that looks innocent or legitimate but performs malicious actions once executed or downloaded
What is a trojan?
A network device that provides a connection through which it relays information to other network devices
What is a node?
A standalone self-replicating software application that invades computers on a network and performs a destructive action
What is a worm?
“Neutral guy” who exploits systems illegally but for personal enjoyment rather than with malicious intent
What is a grey hat hacker?
The collection of technologies, tools, approaches, guidelines, and practices designed to protect networks, devices, and data
What is cybersecurity?
This cyberattack occurs when an unauthorized user takes over an active communication session
What is session hijacking?
This network encrypts traffic from a public device to a private network on the Internet
What is a virtual private network (VPN)?
A collection of data that describes an entity
What is an online reputation?
Harassment targeted toward an individual that relies on the engagement of other users to provoke the victim
What is cyber trolling?
The two types of cyberattacks
What are Computer as Target and Computer as Tool?