Anything that can cause harm. Example, burglar, virus, user error, etc.
threat
An example of ____________ is an alert message that warns users that their computer is infected. This might force users to install associated software in the hopes of fixing the issue.
scareware
Crimes such as creating viruses, disrupting computer networks, etc.
cybercrime
Computers under external control, used by hackers to launch attacks on other computers
zombie
Software that helps protect computer from various malware
anti-malware
Weakness that has not been protected against threats
vulnerability
This type of malware attaches itself to a host file. It can be received by an email attachment, becomes active when the file is opened and can infect other files.
virus
An individual who uses computers to commit crimes.
hacker
Massive networks of zombies used to launch attacks
What is a botnet
Process of identifying and examining possible threats so that the system can be safeguarded against them
risk assessment
Type of malware that self-replicates. Does not need a host file or user action to be triggered.
worm
•Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
•
System integrity:
An attack where a website is bogged down by overwhelming requests/traffic and is forced to shut down. Requests are sent from various zombies and cannot be traced to the original hacker.
Distributed Denial of Service attack
A method in which each packet in encapsulated within another packet before being sent over the Internet. This technique is used by many businesses that allow their employees to work remotely and connect to the company's network.
tunneling
Action or plan to guard against a risk
countermeasure
Type of malware that disguises itself in a more attractive/useful software. It is triggered when user downloads and installs the software. it usually runs behind the scenes.
trojan horse
Protocol that encrypts communication on the network, so that it is unreadable even if stolen.
https
Surge protectors and Uninterruptible Power Supplies (UPS) are called ________ as they protect computers against threats of power fluctuations and power failure.
countermeasure
Type of malware that reports user activity to an outsider. Information such as passwords, account numbers, etc. can be stolen.
spyware
Computer attack to damage a country's infrastructure
cyberterrorism
A scam where a hacker creates a fake website resembling the login page of an authentic website, such as a bank. Then emails users of a fraud requiring them to login and change their password, thus stealing user's login information.
phishing
Principle where an individual receives a certain level of access based on who they are
authorization