Security Terms
Malware
Hacking
Hacker Tools
Countermeasures
100
Anything that can cause harm. Example, burglar, virus, user error, etc.
What is a threat?
100
An example of ____________ is an alert message that warns users that their computer is infected. This might force users to install associated software in the hopes of fixing the issue.
What is scareware
100
Crimes such as creating viruses, disrupting computer networks, etc.
What is a cybercrime
100
Computers under external control, used by hackers to launch attacks on other computers
What is a zombie
100
Software that helps protect computer from various malware
What is anti-malware
200
Weakness that has not been protected against threats
What is a vulnerability
200
This type of malware attaches itself to a host file. It can be received by an email attachment, becomes active when the file is opened and can infect other files.
What is a virus
200
An individual who uses computers to commit crimes.
What is a hacker
200
Massive networks of zombies used to launch attacks
What is a botnet
200
This utility examines and blocks Internet traffic on your computer
What is a firewall
300
Process of identifying and examining possible threats so that the system can be safeguarded against them
What is risk assessment
300
Type of malware that self-replicates. Does not need a host file or user action to be triggered.
What is a worm
300
An individual who breaks into a computer to find its vulnerabilities, but does not conduct a criminal activity
What is a white-hat hacker
300
An attack where a website is bogged down by overwhelming requests/traffic and is forced to shut down. Requests are sent from various zombies and cannot be traced to the original hacker.
What is a Distributed Denial of Service attack
300
A method in which each packet in encapsulated within another packet before being sent over the Internet. This technique is used by many businesses that allow their employees to work remotely and connect to the company's network.
What is tunneling
400
Action or plan to guard against a risk
What is a countermeasure
400
Type of malware that disguises itself in a more attractive/useful software. It is triggered when user downloads and installs the software. it usually runs behind the scenes.
What is a trojan horse
400
Hacking for a political or social agenda
What is activism
400
Protocol that encrypts communication on the network, so that it is unreadable even if stolen.
What is https
400
Principle where an individual must confirm their identity
What is authentication
500
Surge protectors and Uninterruptible Power Supplies (UPS) are called ________ as they protect computers against threats of power fluctuations and power failure.
What is a countermeasure
500
Type of malware that reports user activity to an outsider. Information such as passwords, account numbers, etc. can be stolen.
What is a spyware
500
Computer attack to damage a country's infrastructure
What is cyberterrorism
500
A scam where a hacker creates a fake website resembling the login page of an authentic website, such as a bank. Then emails users of a fraud requiring them to login and change their password, thus stealing user's login information.
What is phishing
500
Principle where an individual receives a certain level of access based on who they are
What is authorization