Protection
Attacks
More Attacks
Computer Terms
100
Computer programs that can block, detect, and remove viruses and other malware.
What is Antivirus Software
100
Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
What is a Hacktivist.
100
A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
What is a Computer Virus.
100
Two or more interconnected devices that can exchange data.
What is a Computer Network.
200
Software designed to block malware from entering protected networks.
What is a Firewall.
200
A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
What is Software Vulnerability.
200
Unsolicited emails sent to many addresses. The purpose of most spam is to make money through advertising or identity theft.
What is Spam.
200
A company or organization that gives users and devices access to the Internet.
What is an Internet Service Provider (ISP)
300
A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
What is a Software Patch.
300
A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.
What is Ransomeware.
300
Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
What is Malware.
300
Consists of code written in a programming language that instructs computers to perform specific tasks.
What is Software.
400
The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.
What is Encryption.
400
Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
What is Phishing.
400
A program that records every key struck on a keyboard and sends that information to an attacker.
What is Keylogger Malware.
400
A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
What is a Server.
500
Extra copies of computer files that can be used to restore files that are lost or damaged.
What are Backups.
500
Attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
What is DDoS or distributed denial of service
500
A fictional virus modeled after the Stuxnet virus. Like Stuxnet, this virus is able to damage physical infrastructure.
What is Doxnet.
500
A data storage device that is used to store, back up, and transfer computer files.
What is a USB drive.