LESSON 4: INTERNET THREATS

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:07 AM on 4/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards

INTERNET THREATS

WEB-BASED THREATS OR ONLINE THREATS

2
New cards

INTERNET THREATS

CATEGORY OF CYBERSECURITY RISKS THAT MAY CAUSE AN UNDESIRABLE EVENT OR ACTION VIA THE INTERNET

3
New cards

MALWARE

CATCH-ALL TERM FOR ANY TYPE OF MALICIOUS SOFTWARE

4
New cards

MALWARE

ANY PROGRAM OR FILE DESIGNED TO INTENTIONALLY HARM, INFECT, OR GAIN UNAUTHORIZED ACCESS TO COMPUTERS, NETWORKS, AND MOBILE DEVICES

5
New cards

VIRUS

SPECIFIC TYPE OF MALWARE THAT SPREADS BY ATTACHING TO OTHER CLEAN FILES AND PROGRAMS

6
New cards

TROJAN HORSE VIRUS

PRETENDS TO BE A RELIABLE APPLICATION

7
New cards

ROGUE SECURITY SOFTWARE

TRICKS CONSUMERS INTO THINKING THEIR COMPUTER HAS A VIRUS AND THEN PERSUADE THEM TO PAY FOR A PHONY MALWARE REMOVING PROGRAM THAT INSTALLS MALWARE

8
New cards

WORM

SUBSET OF TROJAN HORSE

9
New cards

WORM

SPREADS OR REPLICATE FROM ONE COMPUTER TO ANOTHER

10
New cards

WORM

YOUR LAN (LOCAL AREA NETWORK) CONNECTION IS OFTEN HOW _______ SPREAD

11
New cards

SPYWARE

PLACED ON AN COMPUTER WITHOUT THE END USER’S KNOWLEDGE

12
New cards

SPYWARE

IT INTRUDES, TAKES PRIVATE INFORMATION AND INTERNET USAGE DATA, PASSING IT TO THIRD PARTIES

13
New cards

SPYWARE

HARD TO DETECT

14
New cards

KEYLOGGER

ACT OF SECRETLY RECORDING THE KEYS PRESSED ON A KEYBOARD

15
New cards

KEYLOGGER

AKA “KEYSTROKE LOGGING” OR “KEYBOARD CAPTURE”

16
New cards

ADWARE

AKA “ADVERTISEMENT-SUPPORTED SOFTWARE”

17
New cards

ADWARE

MAKES MOENY FOR ITS CREATORS BY DISPLAYING BANNER ADS

18
New cards

ADWARE

TYPICALLY INSIDE OF A WEB BROWSER

19
New cards

SPAM

“MALWARE SPAM” OR “MALICIOUS SPAM”

20
New cards

SPAM

SPAM MESSAGES THAT INCLUDE MALWARE

21
New cards

SPAM

OFTEN EMAILS

22
New cards

PHISHING

TRICKING PEOPLE INTO CLICKING FAKE EMAILS OR LINKS SO MALWARE GETS INSTALLED.

23
New cards

SPEAR PHISHING

A TARGETED PHISHING ATTACK SENT TO A SPECIFIC PERSON OR GROUP TO SPREAD MALWARE.

24
New cards

NETWORKS

MALWARE SPREADS THROUGH CONNECTED COMPUTERS, ESPECIALLY ON UNPROTECTED OR SHARED NETWORKS.

25
New cards

SECURITY HOLES

WEAKNESSES OR BUGS IN SOFTWARE THAT MALWARE USES TO GET INTO A COMPUTER.

26
New cards

FILE SHARING

MALWARE HIDES IN DOWNLOADED FILES AND SPREADS WHEN PEOPLE SHARE THEM.

27
New cards

SOCIAL NETWORKS

MALWARE SPREADS THROUGH FAKE POSTS, LINKS, OR MESSAGES ON SOCIAL MEDIA.

28
New cards

INSTANT MESSENGERS

MALWARE SPREADS WHEN PEOPLE CLICK MALICIOUS LINKS OR FILES SENT IN CHATS.

29
New cards

EXTERNAL DEVICES

MALWARE SPREADS THROUGH INFECTED USB DRIVES, HARD DRIVES, OR OTHER PLUG-IN DEVICES.