1/18
Vocabulary flashcards that cover key terms and principles from Module 4 on Computer Security, including common threats, protective software, and best practices.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computer Security
The practice of protecting computers and the data they hold from unauthorized access, damage, or misuse.
Malware
A broad category of malicious software created to harm a computer or steal information.
Virus
A self-replicating piece of malware that attaches to clean files and spreads by infecting other files with malicious code.
Trojan
Malware disguised as legitimate software that tricks users into installing it, then causes damage or harvests data.
Spyware
Malware that secretly records user activity—such as keystrokes—to collect sensitive information like credit-card numbers.
Ransomware
Malware that locks or encrypts a user’s files and demands a ransom payment to restore access.
Adware
Advertising software that may also be used to distribute or install malware.
Botnets
Networks of malware-infected computers remotely controlled by cyber-criminals to perform tasks without the owners’ permission.
Phishing
A social-engineering attack in which fraudulent emails impersonate legitimate companies to trick victims into revealing sensitive data.
Strong Password
A unique, complex passphrase that avoids personal data and helps secure an account against unauthorized access.
Security Patch
A software update issued by a vendor to fix identified security flaws.
Security Vulnerability
A weakness in software or systems that attackers can exploit to compromise security.
Software Update
The act of installing the latest versions or patches for an operating system or application to improve security and functionality.
Antivirus Software
A program that scans for, detects, and removes viruses as well as other malicious code.
Anti-malware Software
Security software designed to identify and block a wide range of malicious programs, including viruses, spyware, and ransomware.
Password Manager
A tool that securely stores and generates strong, unique passwords for all of a user’s accounts.
Encryption
The process of converting readable data into coded form that only authorized parties can decipher.
Be Cautious
Cybersecurity principle advising users not to click suspicious links or download unknown files—if it seems too good to be true, it probably is!
Mindful Online Activity
The practice of carefully considering what personal information you share on the internet, knowing it can be difficult to remove once posted.