1/17
A series of vocabulary flashcards to help students review key terms related to Cyber Security.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Cyber Security
The practice of protecting systems, networks, and programs from digital attacks.
Malware
Malicious software designed to harm, exploit, or otherwise compromise a system, including viruses, worms, and ransomware.
Phishing
A method of trying to gather personal information using deceptive emails and websites.
Antivirus Software
Programs designed to detect and remove malware, including viruses, trojans, and other types of harmful software.
Spyware
Software that secretly monitors user activity and collects personal information without consent.
Firewall
A network security device that monitors and controls incoming and outgoing network traffic.
Data Encryption
The process of converting information or data into a code to prevent unauthorized access.
Two-Factor Authentication
An additional layer of security used to ensure that people trying to gain access to an online account are who they say they are.
Public Wi-Fi Security
The practices one should follow to protect personal information while using wireless connections in public places.
Password Management
The process of creating, storing, and using strong passwords to protect online accounts.
Cloud Security
The set of policies and technologies designed to protect data, applications, and infrastructures associated with cloud computing.
Social Engineering
A manipulation technique that exploits human psychology to gain confidential information.
User Account Control (UAC)
A Windows feature that helps prevent unauthorized changes to the operating system.
ActiveX
A software framework used to create interactive content on websites, but often exploited by hackers.
Drive-by Downloads
Unintentional downloading of malicious software when visiting a compromised website.
Zero-Day Virus
A security vulnerability that is exploited by hackers before the software creator is aware and able to issue a fix.
Spam
Unsolicited messages sent via email or other electronic means to multiple users.
Identity Theft
The act of obtaining and using someone else's personal information, usually for financial gain.