Malicious Software
Malicious Software
Hacking
Security
Miscellaneous
100
This infects computers to take control of them in some way; includes viruses, worms, spyware, Trojan horses, and adware
What is malware
100
The mass distribution of unsolicited messages or advertisements to addresses that can easily be found on the internet
What is spam
100
The process by which cyber criminals gain access to your computer
What is hacking
100
A branch of computer security specifically related to the Internet
What is internet security
100
The wrongful or criminal deception for personal or financial gain online
What is internet fraud
200
Viruses: malicious computer programs that infect your computer and often the computers of your contacts as well; often sent as an email attachment or download
What are viruses
200
This malicious program is disguised as, or embedded within, legitimate software; an executable file that will install itself and run automatically once it's downloaded
What is a Trojan horse
200
A flaw or susceptibility in a system that can be exploited as a gateway for hackers to install malware; computer vulnerability
What is a security hole
200
The process of converting information or data into a code, especially to prevent unauthorized access
What is encryption
200
A series of points, or nodes, interconnected by communication paths for the purpose of transmitting, receiving and exchanging data, voice and video traffic
What is a network
300
This software automatically displays or downloads unsolicited advertising when a user is online
What is adware
300
A collection of robots that infect computers that are remotely controlled by the originator; send spam and spread malware
What is are botnets
300
A method in which a hacker can bypass normal authentication on a computer to gain remote access without the knowledge of the user; may refer to installed software of a modification to an existing program or hardware
What is a backdoor
300
Software used to safeguard a computer from malware, including viruses, computer worms, and Trojans; may also remove or prevent spyware and adware
What is anti-virus software
300
A type of network wherein anyone, namely the general public, has access and through it can connect to other networks or the Internet
What is a public network
400
This software collects your information without you knowing about it; it's often automatically installed and infects your computer with viruses
What is spyware
400
A malicious user gets a network of zombie computers to sabotage a website or server by getting them to ‘visit’ the site repeatedly, causing it to be slow or shut down; denies access to legitimate users
What is a Distributed Denial-of-Service attack (DDoS attack)
400
The virtual “listening in” of information that's shared over an unsecure (not encrypted) Wi-Fi network
What is Wi-Fi eavesdropping
400
A network that uses private IP address space
What is a private network
400
A website or email address created to look legitimate; may include your own name or the name of someone you know to make the distinction between real and fake even harder
What is spoofing
500
This type of malware restricts access to your computer or files and demands payment in order to give your access back; it usually comes in the form of phishing emails and website pop-up advertisements
What is ransomware
500
This malware lives in your computer memory but doesn’t affect hard drive; sends itself to other computers in a network and doesn’t need to attach to files or programs
What is a worm
500
The redirecting of a legitimate URL to an illegitimate website; convinces users the website is real so users will input personal and/ or financial information to be stolen
What is pharming
500
Protection configured (in hardware, software, or both) with specific criteria to block or prevent unauthorized access to a network
What is a firewall
500
Fake emails, text messages, and websites created to look authentic as a means of stealing personal and financial information; also known as ‘spoofing’
What is phishing