any form or type of software that is developed for the primary purpose of causing harm to data,
systems, and/or users - Answers malware
malicious software that attaches itself to a legitimate file so that it might infect other systems when that
file is shared - Answers virus
an executable program that appears to be something useful but is actually harmful - Answers trojan
horse
malicious software that spreads to other systems on the network without the assistance of humans -
Answers worms
malicious software that collects user information typically without the user's knowledge or consent -
Answers spyware
malicious software that holds data or a system hostage until an attacker's demands are met - Answers
randsomware
a device that prevents unauthorized access to a network - Answers firewall
the process of transforming plaintext into ciphertext - Answers encryption
the process of transforming ciphertext into plaintext - Answers decription
an internal network created for the purpose of attracting an attacker - Answers honeynet
an authentication method that relies on "something you are" - Answers biometrics
authentication relying on "something you have" might use this - Answers JMU ID card
when a user enters their authentication credentials only once yet gains access to multiple related
systems - Answers single sign-on
encryption that requires two mathematically related keys - Answers asymmetric encryption
a system that monitors a network, records user access, and categorizes attempts as valid or invalid -
Answers Intrusion Detection System (IDS)
when a computer criminal replaces a legitimate program with an unauthorized program for malicious
purposes - Answers userpation
when someones deceives by pretending to be someone else - Answers pretexting
when an attacker sends an email that appears to have come from a legitimate sender that requests
confidential data from the receiver - Answers phishing