Cyber Security

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

Antivirus Software

Designed to detect and destroy computer virus

2
New cards

Back Doors

A feature or defect of a computer system that allows surreptitious unauthorized access to data

3
New cards

Blended Threats

A software exploit which in turns involves a combination of attacks against different vulnerabilities

4
New cards

Bots

A bot is an automated program that runs over the Internet

5
New cards

Cybersecurity

Is the body of technology's, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access

6
New cards

Cyber Exercise

A planned event during which an organization simulates a cyber disruption to develop or test capabilities

7
New cards

Encryption

Encryption is the process of converting data to an unrecognizable or "encrypted" form. It is commonly used to protect sensitive information so that only authorized parties can view it

8
New cards

Firewall

It acts as a barrier between a trusted system or network and outside connections, such as the Internet.

9
New cards

Gateway

A network point that acts as an entrance to another network

10
New cards

Hacker

A person who uses computers to gain unauthorized access to data

11
New cards

Internet

Is global system of interconnected computer networks that use the internet protocol suite

12
New cards

Intranet

A local or restricted communications network, especially a private network created using World Wide Web software

13
New cards

Keylogger

Type of surveillance software that has the capability to record every key stroke you make on a Log file, usually encrypted

14
New cards

Malware

Software that is intended to damage or disable computers and computer systems

15
New cards

Phishing

The activity of defrauding an online account holder of financial information by posing as a legitimate company

16
New cards

Spyware

Software that enables a user to obtain convert information about another's computer activities by transmitting data from their hard drive

17
New cards

Trojan Horse

A program that claims to rid your computer of viruses but instead introduces viruses onto your computer

18
New cards

Virus

Computer viruses are small programs or scripts that can negatively affect the health of your computer.

19
New cards

Worm

Self replicating virus that does not alter files but resides in active memory and duplicates itself