Hackers
Security Measures
Devices
Hackers2
Pig in a poke
100

gaining unauthorised access to a network system

hacking

100

storing a copy of files on a storage device to keep them safe

backup

100

a type of machine used by banks for enabling customers to withdraw money from their bank accounts

ATM, cash machine

100

an expert lacking in social skills

geek

100

a program that checks files for virus coding instructions inside another program and can be used for removing any virus coding instructions detected

anti-virus program

200

distributing programs that can reproduce themselves and are written with the purpose of causing damage or causing a computer to behave in an unusual way

spreading viruses

200

a secret code used to control access to a network system

password

200

a tiny, portable device that plugs into the USB port on your computer host, which can save information on a small flash memory chip. People commonly use it for data storage, backup, and transferring information between various devices, like cameras to computers, and vice versa.

USB stick

200

send to a different email address than the one it was originally sent to

reroute e-mail

200

electronic currency that is used for making electronic purchases over the Internet

digital cash

300

a technique that involves adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something destructive in the background.

Trojan horse

300

protecting data by putting it in a form only authorised users can understand

encrypting

300

when a person gains entry to a computer network, system, application software, data, or other resources without permission. Also when legitimate users access a resource that they do not have permission to use

unauthorised access

300

redirecting the Web address (URL) to point to another website

Hijacking websites

300

combination of all the data on all the computer networks throughout the world, accessed using the Internet

cyberspace

400

a program that can reproduce itself and is written with the purpose of causing damage or causing a computer to behave in an unusual way. It infects other programs i.e. it attaches itself to other programs, known as host programs, and therefore reproduces itself

a computer virus

400

a combination of hardware and software used to control the data going into and out of a network

firewall

400

security devices that measure some aspect of a living being e.g. a fingerprint reader or an eye scanner

biometric security devices

400

changing the text and graphics on the webpages, sometimes leaving very rude messages on the system

defacing websites

400

software that is free to try out but must be paid for if it is used after the trial period

shareware

500

manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small

salami shaving
500

A person who uses their skills to make cyberspace safer

white hat hacker

500

electronic devices that protect equipment from damage due to a sudden surge in a power supply

surge protectors

500

a slang term for an eccentric, socially inept person with little or no fashion sense and having an obsessive interest in a hobby or subject

anorak

500

a system that automatically disconnects a telephone line after receiving a call and then dials the telephone number of the system that made the call, to reconnect the line. It is used in remote access systems to make sure that connections can only be made from permitted telephone numbers

callback system