1/13
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Computer Security
Computer security involves protecting computer systems and data from unauthorized access or damage. Passwords and antivirus software help improve security.
Cybersecurity
Cybersecurity refers to protecting digital systems
Vulnerability
A vulnerability is a weakness in a system that can be exploited by attackers. Weak passwords are common examples of vulnerabilities.
Threat
A threat is anything that can cause harm to a computer system or data. Viruses and hackers are examples of threats.
Cyberbullying
Cyberbullying involves using digital platforms to harass
Identity Theft
Identity theft occurs when someone steals personal information to commit fraud or crimes. Stolen credit card information may be used illegally online.
Phishing
Phishing is a scam where fake emails or websites trick users into revealing personal information. Fake bank emails requesting passwords are common phishing attempts.
Malware
Malware is harmful software designed to damage or disrupt computer systems. Viruses
Firewall
A firewall is a security system that monitors and controls incoming and outgoing network traffic. It helps block unauthorized access to systems.
Encryption
Encryption converts data into coded form to prevent unauthorized access. Online banking systems use encryption to protect customer information.
Automation
Automation uses machines and software to perform tasks with little human involvement. Self-checkout machines in supermarkets are examples of automation.
E-commerce
E-commerce involves buying and selling goods or services online. Examples include online stores and electronic payments.
Telemedicine
Telemedicine allows doctors to provide medical services remotely using communication technology. Video consultations are a common example.
Biometrics
Biometrics uses physical characteristics such as fingerprints or facial scans for identification. Smartphones often use biometric security systems.