Looks like no one added any tags here yet for you.
What is cybercrime?
Any criminal action perpetrated primarily through the use of a computer.
What is identity theft?
Occurs when a thief steals personal information to run up debt in your name.
What are the types of hackers?
White-hat (ethical), black-hat (malicious), and grey-hat (flaunts expertise).
What is a denial-of-service attack?
An attack denying users access to a computer system by flooding it with requests.
What is a Trojan horse?
A program that appears useful but runs malicious activities in the background.
What are computer viruses used for?
To replicate themselves and copy code to as many other files as possible.
What is anti-spyware software?
A program that detects unwanted programs and allows users to delete them.
What is phishing?
A technique used to lure internet users into revealing personal information.
What are the main functions of antivirus software?
Detection, stopping execution of viruses, quarantining, and preventing future infections.
What are cookies?
Small text files stored by websites to provide information about browsing habits.
What are the guidelines to create strong passwords?
At least 14 characters long, mix of letters and symbols, and changed regularly.
How does a firewall protect computers?
By blocking access to logical ports and keeping network addresses secure.
What are the three primary forms of malware?
Adware, spyware, and viruses.
What should be done to protect computers from power surges?
Use surge protectors and replace them every two to three years.
What is the purpose of a backup?
To create copies of files to replace originals if they are lost or damaged.
What is scareware?
Malware that convinces users their computer is infected, prompting a purchase of fake removal tools.