Security Terms
Malware
Hacking
Hacker Tools
Countermeasures
100

Anything that can cause harm. Example, burglar, virus, user error, etc.

 threat

100

An example of ____________ is an alert message that warns users that their computer is infected. This might force users to install associated software in the hopes of fixing the issue.

 scareware

100

Crimes such as creating viruses, disrupting computer networks, etc.

cybercrime

100

Computers under external control, used by hackers to launch attacks on other computers

 zombie

100

Software that helps protect computer from various malware

 anti-malware

200

Weakness that has not been protected against threats

 vulnerability

200

This type of malware attaches itself to a host file. It can be received by an email attachment, becomes active when the file is opened and can infect other files.

 virus

200

An individual who uses computers to commit crimes.

 hacker

200

Massive networks of zombies used to launch attacks

What is a botnet

200
This utility examines and blocks Internet traffic on your computer
What is a firewall
300

Process of identifying and examining possible threats so that the system can be safeguarded against them

risk assessment

300

Type of malware that self-replicates. Does not need a host file or user action to be triggered.

worm

300

•Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

System integrity:

300

An attack where a website is bogged down by overwhelming requests/traffic and is forced to shut down. Requests are sent from various zombies and cannot be traced to the original hacker.

 Distributed Denial of Service attack

300

A method in which each packet in encapsulated within another packet before being sent over the Internet. This technique is used by many businesses that allow their employees to work remotely and connect to the company's network.

 tunneling

400

Action or plan to guard against a risk

 countermeasure

400

Type of malware that disguises itself in a more attractive/useful software. It is triggered when user downloads and installs the software. it usually runs behind the scenes.

 trojan horse

400
Hacking for a political or social agenda
What is activism
400

Protocol that encrypts communication on the network, so that it is unreadable even if stolen.

 https

400
Principle where an individual must confirm their identity
What is authentication
500

Surge protectors and Uninterruptible Power Supplies (UPS) are called ________ as they protect computers against threats of power fluctuations and power failure.

countermeasure

500

Type of malware that reports user activity to an outsider. Information such as passwords, account numbers, etc. can be stolen.

 spyware

500

Computer attack to damage a country's infrastructure

 cyberterrorism

500

A scam where a hacker creates a fake website resembling the login page of an authentic website, such as a bank. Then emails users of a fraud requiring them to login and change their password, thus stealing user's login information.

 phishing

500

Principle where an individual receives a certain level of access based on who they are

 authorization