Designed to detect and destroy computer virus
A feature or defect of a computer system that allows surreptitious unauthorized access to data
A software exploit which in turns involves a combination of attacks against different vulnerabilities
A bot is an automated program that runs over the Internet
Is the body of technology's, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
A planned event during which an organization simulates a cyber disruption to develop or test capabilities
Encryption is the process of converting data to an unrecognizable or "encrypted" form. It is commonly used to protect sensitive information so that only authorized parties can view it
It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
A network point that acts as an entrance to another network
A person who uses computers to gain unauthorized access to data
Is global system of interconnected computer networks that use the internet protocol suite
A local or restricted communications network, especially a private network created using World Wide Web software
Type of surveillance software that has the capability to record every key stroke you make on a Log file, usually encrypted
Software that is intended to damage or disable computers and computer systems
The activity of defrauding an online account holder of financial information by posing as a legitimate company
Software that enables a user to obtain convert information about another's computer activities by transmitting data from their hard drive
A program that claims to rid your computer of viruses but instead introduces viruses onto your computer
Computer viruses are small programs or scripts that can negatively affect the health of your computer.
Self replicating virus that does not alter files but resides in active memory and duplicates itself
YOU MIGHT ALSO LIKE...
Chapter 11 quiz
Technology In Action Ch. 9
Security + CH2
OTHER SETS BY THIS CREATOR
Science - The Big Band Quiz
THIS SET IS OFTEN IN FOLDERS WITH...
FBLA Cyber Security
FBLA Cyber Security
Cyber Security Terms
Cyber Security Review