randsomware - ✔️✔️malicious software that holds data or a system hostage until an
attacker's demands are met
virus - ✔️✔️malicious software that attaches itself to a legitimate file so that it might
infect other systems when that file is shared
trojan horse - ✔️✔️an executable program that appears to be something useful but is
actually harmful
worms - ✔️✔️malicious software that spreads to other systems on the network without
the assistance of humans
spyware - ✔️✔️malicious software that collects user information typically without the
user's knowledge or consent
firewall - ✔️✔️a device that prevents unauthorized access to a network
encryption - ✔️✔️the process of transforming plaintext into ciphertext
decription - ✔️✔️the process of transforming ciphertext into plaintext
honeynet - ✔️✔️an internal network created for the purpose of attracting an attacker
biometrics - ✔️✔️an authentication method that relies on "something you are"
JMU ID card - ✔️✔️authentication relying on "something you have" might use this
single sign-on - ✔️✔️when a user enters their authentication credentials only once yet
gains access to multiple related systems
asymmetric encryption - ✔️✔️encryption that requires two mathematically related keys
Intrusion Detection System (IDS) - ✔️✔️a system that monitors a network, records user
access, and categorizes attempts as valid or invalid
userpation - ✔️✔️when a computer criminal replaces a legitimate program with an
unauthorized program for malicious purposes
pretexting - ✔️✔️when someones deceives by pretending to be someone else