Cyberspace
What is Cybersecurity?
Threats
Cyber-crimes
The Deep Web
100

an interdependent network of information technology infrastructures including the Internet, telecommunications networks, and computer systems.

What is, cyberspace. 

100

According to the text, dams, railways, and power plants are considered ______.

infrastructures

100

A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation.

Virus

100

Someone overseas offering the victim a share in a large sum of money or a payment on the condition the victim helps them to transfer money out of their country.

Nigerian letter

100

Some of the most popular products advertised on the hidden wiki are ______.

drugs

200

______ is a global system of interconnected computer networks that are set up to exchange various types of data.

What is, The Internet?

200

According to General Michael Hayden, a cybersecurity knowledge gap exists between ______.


youthful generation and older generation

200

a person who uses programming skills to gain illegal access to a computer network or

hacker

200

 the use of technology to harass, threaten, embarrass, or target another person

cyber-bullying

200

What is TOR?

The Onion Router, is free and open-source software for enabling anonymous communication.

300

3 layers of cyberspace 

physical, information, logic. 

300

the activity of converting data or information into code

encryption

300

Multimedia message services viruses target ______.

mobile devices

300

An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as ______


economic espionage

300

On the darknet, prices are listed in ______ and are shipped to remote addresses or P.O. boxes.

bitcoins

400

the acronym URL?

Uniform Resource Locator 

400

______ are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the Internet.

Fire walls

400

A ______ malware is disguised as, or embedded within, legitimate software.

Trojan Horse

400

malicious computer software that interferes with
normal computer functions or sends personal data about the user to unauthorized parties over the internet

malware

400

Two of the most popular forms of cryptocurrency are ______.

bitcoins and ethereum

500

The ______ of the Internet might be a concern for parents regarding who their children may be talking to online.

anonymity/identity

500

Work-for-hire hackers who work for private security corporations are also referred to as ______.

red teams

500

______ viruses attach to the original code, changing the start-up information of the program.

Add-on

500

a network of maliciously installed bots running on multiple computers

botnet

500

The Darknet Silk Road runs like a black market ______ site for drugs, drug paraphernalia, and other goods and services.

ebay-type