CYBERSECURITY WITH VERIFIED SOLUTIONSGUARANTEED SUCCESS
Virus This is like a harmful digital bug. It is a sneaky program that can get into your computer or device without you knowing. Once it is inside, it can cause trouble by copying itself, slowing down your device, or even stealing your personal information. Malware Malicious software programs designed to disrupt or harm a computer, network, smartphone, or other device. Brainpower Read More Previous Play Next Rewind 10 seconds Move forward 10 seconds Unmute 0:00 / 0:00 Full screen Backups Copies of data and/or software are taken regularly and usually stored in a different location Antivirus Software usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them. Network a group of two or more computer systems linked together Phishing Imagine someone pretending to be a trustworthy company or person, like a friend or a favorite store. They send you a message, like an email or text, asking for your personal information, like your password or credit card number. But in reality, they are trying to trick you into giving away your private details, so they can use it for bad things. Extortion Stealing something, especially money, through force or threats Ransomware a type of malware designed to block access to a computer or device until a sum of money is paid. Botnet Attack group of compromised computers, that someone takes control of and uses to attack other computers and networks, but each individual computer is known as a zombie. Social Engineering hackers use their social skills to trick people into revealing access credentials or other valuable information Cryptocurrency a system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds Crypto Hijacking stealing sensitive information from a user or digital platform to divert crypto into a different digital wallet Cybersecurity The act of securing and protecting individuals, businesses, organizations, and governments that are connected to the Internet and the Web. Who is at risk for cybersecurity attacks? Individuals, small businesses, schools, large organizations, government agencies A strong password includes Numbers, Symbols, lower case and capital Letters, and adequate length cloud a technology that allows us to access our files/services through the internet instead of through the storage (hard drive) of our device. Software the programs and other operating information used by a computer. Domain a group of computers, printers, and devices that are interconnected and governed as a whole. For example, your Chromebook is part of the NCS _____________. VPN (Virtual Private Network) Encrypted connection over the Internet between a computer or remote network and a private network. IP Address (Internet Protocol Address) A unique number identifying every computer on the Internet (like 197.123.22.240). Similar to your home address. Data Breach the moment a hacker successfully exploits a vulnerability in a computer or device and gains access to its files and network. Firewall Part of a computer system that is designed to block unauthorized access Trojan Horse Virus hides inside other software, usually as an attachment or a downloadable file Worm a software program capable of reproducing itself that can spread from one computer to the next over a network Spyware software that collects data about the user and transmits it over the Internet without the user's knowledge or permission Rootkit program that hides in a computer and allows someone from a remote location to take full control of the computer DDoS Attack Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed. Encryption a process of encoding messages to keep them secret, so only "authorized" parties can read it. Pen Testing Short for "penetration testing," this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws. Clickjacking is a technique that tricks users into clicking on a malicious link by adding the link to a transparent layer over what appears to be a legitimate web page. Deepfakes fake videos or audio recordings that look and sound just like the real thing white hat hackers Someone who uncovers computer weaknesses without exploiting them. The goal of the white hat hacker is to improve system security. black hat hackers break into systems to destroy information or for illegal gain
Geschreven voor
- Instelling
- CYBER AWARENESS CHALLENGE 2024
- Vak
- CYBER AWARENESS CHALLENGE 2024
Documentinformatie
- Geüpload op
- 13 januari 2024
- Aantal pagina's
- 4
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
cybersecurity
Ook beschikbaar in voordeelbundel