potentially damaging program that infects a computer, and alters the files or the way the computer works without the user's knowledge or permission.
denial of service
attack by hackers to disrupt a computer's access to an Internet service
convert plain text to ciphered text to enforce confidentiality
identity verification using a person's physical characteristics
looks legitimate, but hides malicious code
hardware or software to keep hackers and malicious programs from entering a network
an attack where a hacker controls a large number of "zombie" computers against a victim server computer
It is easier to access and intercept traffic on a ____ network than on a wired network.
Which is not malicious software? spyware, cookie, virus, or worm