Cyber Security for Beginners

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

A series of vocabulary flashcards to help students review key terms related to Cyber Security.

Last updated 5:39 PM on 2/28/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

Cyber Security

The practice of protecting systems, networks, and programs from digital attacks.

2
New cards

Malware

Malicious software designed to harm, exploit, or otherwise compromise a system, including viruses, worms, and ransomware.

3
New cards

Phishing

A method of trying to gather personal information using deceptive emails and websites.

4
New cards

Antivirus Software

Programs designed to detect and remove malware, including viruses, trojans, and other types of harmful software.

5
New cards

Spyware

Software that secretly monitors user activity and collects personal information without consent.

6
New cards

Firewall

A network security device that monitors and controls incoming and outgoing network traffic.

7
New cards

Data Encryption

The process of converting information or data into a code to prevent unauthorized access.

8
New cards

Two-Factor Authentication

An additional layer of security used to ensure that people trying to gain access to an online account are who they say they are.

9
New cards

Public Wi-Fi Security

The practices one should follow to protect personal information while using wireless connections in public places.

10
New cards

Password Management

The process of creating, storing, and using strong passwords to protect online accounts.

11
New cards

Cloud Security

The set of policies and technologies designed to protect data, applications, and infrastructures associated with cloud computing.

12
New cards

Social Engineering

A manipulation technique that exploits human psychology to gain confidential information.

13
New cards

User Account Control (UAC)

A Windows feature that helps prevent unauthorized changes to the operating system.

14
New cards

ActiveX

A software framework used to create interactive content on websites, but often exploited by hackers.

15
New cards

Drive-by Downloads

Unintentional downloading of malicious software when visiting a compromised website.

16
New cards

Zero-Day Virus

A security vulnerability that is exploited by hackers before the software creator is aware and able to issue a fix.

17
New cards

Spam

Unsolicited messages sent via email or other electronic means to multiple users.

18
New cards

Identity Theft

The act of obtaining and using someone else's personal information, usually for financial gain.

Explore top notes

note
Introduction to Anxiety
Updated 1136d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 547d ago
0.0(0)
note
Chapter 1 : What is an algorithm?
Updated 1180d ago
0.0(0)
note
Growth of Industry Notes
Updated 527d ago
0.0(0)
note
Unit 7: Period 7: 1890–1945
Updated 65d ago
0.0(0)
note
Introduction to Anxiety
Updated 1136d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 547d ago
0.0(0)
note
Chapter 1 : What is an algorithm?
Updated 1180d ago
0.0(0)
note
Growth of Industry Notes
Updated 527d ago
0.0(0)
note
Unit 7: Period 7: 1890–1945
Updated 65d ago
0.0(0)

Explore top flashcards

flashcards
Patho exam 4
75
Updated 704d ago
0.0(0)
flashcards
week 3
72
Updated 761d ago
0.0(0)
flashcards
AP Human Geography Vocab Unit 5
76
Updated 1109d ago
0.0(0)
flashcards
Chapter 9- Management
91
Updated 1080d ago
0.0(0)
flashcards
Freedom/Liberty
31
Updated 1033d ago
0.0(0)
flashcards
Patho exam 4
75
Updated 704d ago
0.0(0)
flashcards
week 3
72
Updated 761d ago
0.0(0)
flashcards
AP Human Geography Vocab Unit 5
76
Updated 1109d ago
0.0(0)
flashcards
Chapter 9- Management
91
Updated 1080d ago
0.0(0)
flashcards
Freedom/Liberty
31
Updated 1033d ago
0.0(0)