1/28
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
INTERNET THREATS
WEB-BASED THREATS OR ONLINE THREATS
INTERNET THREATS
CATEGORY OF CYBERSECURITY RISKS THAT MAY CAUSE AN UNDESIRABLE EVENT OR ACTION VIA THE INTERNET
MALWARE
CATCH-ALL TERM FOR ANY TYPE OF MALICIOUS SOFTWARE
MALWARE
ANY PROGRAM OR FILE DESIGNED TO INTENTIONALLY HARM, INFECT, OR GAIN UNAUTHORIZED ACCESS TO COMPUTERS, NETWORKS, AND MOBILE DEVICES
VIRUS
SPECIFIC TYPE OF MALWARE THAT SPREADS BY ATTACHING TO OTHER CLEAN FILES AND PROGRAMS
TROJAN HORSE VIRUS
PRETENDS TO BE A RELIABLE APPLICATION
ROGUE SECURITY SOFTWARE
TRICKS CONSUMERS INTO THINKING THEIR COMPUTER HAS A VIRUS AND THEN PERSUADE THEM TO PAY FOR A PHONY MALWARE REMOVING PROGRAM THAT INSTALLS MALWARE
WORM
SUBSET OF TROJAN HORSE
WORM
SPREADS OR REPLICATE FROM ONE COMPUTER TO ANOTHER
WORM
YOUR LAN (LOCAL AREA NETWORK) CONNECTION IS OFTEN HOW _______ SPREAD
SPYWARE
PLACED ON AN COMPUTER WITHOUT THE END USER’S KNOWLEDGE
SPYWARE
IT INTRUDES, TAKES PRIVATE INFORMATION AND INTERNET USAGE DATA, PASSING IT TO THIRD PARTIES
SPYWARE
HARD TO DETECT
KEYLOGGER
ACT OF SECRETLY RECORDING THE KEYS PRESSED ON A KEYBOARD
KEYLOGGER
AKA “KEYSTROKE LOGGING” OR “KEYBOARD CAPTURE”
ADWARE
AKA “ADVERTISEMENT-SUPPORTED SOFTWARE”
ADWARE
MAKES MOENY FOR ITS CREATORS BY DISPLAYING BANNER ADS
ADWARE
TYPICALLY INSIDE OF A WEB BROWSER
SPAM
“MALWARE SPAM” OR “MALICIOUS SPAM”
SPAM
SPAM MESSAGES THAT INCLUDE MALWARE
SPAM
OFTEN EMAILS
PHISHING
TRICKING PEOPLE INTO CLICKING FAKE EMAILS OR LINKS SO MALWARE GETS INSTALLED.
SPEAR PHISHING
A TARGETED PHISHING ATTACK SENT TO A SPECIFIC PERSON OR GROUP TO SPREAD MALWARE.
NETWORKS
MALWARE SPREADS THROUGH CONNECTED COMPUTERS, ESPECIALLY ON UNPROTECTED OR SHARED NETWORKS.
SECURITY HOLES
WEAKNESSES OR BUGS IN SOFTWARE THAT MALWARE USES TO GET INTO A COMPUTER.
FILE SHARING
MALWARE HIDES IN DOWNLOADED FILES AND SPREADS WHEN PEOPLE SHARE THEM.
SOCIAL NETWORKS
MALWARE SPREADS THROUGH FAKE POSTS, LINKS, OR MESSAGES ON SOCIAL MEDIA.
INSTANT MESSENGERS
MALWARE SPREADS WHEN PEOPLE CLICK MALICIOUS LINKS OR FILES SENT IN CHATS.
EXTERNAL DEVICES
MALWARE SPREADS THROUGH INFECTED USB DRIVES, HARD DRIVES, OR OTHER PLUG-IN DEVICES.