1/18
A set of vocabulary flashcards designed to review key concepts related to the social and economic impact of information and communications technology.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Computer Security
Refers to the protection of computer systems and networks from unauthorized access, damage, theft, disruption, or misuse of data and resources.
Cybersecurity
A subset of computer security specifically focused on protecting systems and data from cyber threats.
Vulnerability
Weaknesses in a system that can be exploited by threats.
Threat
Any potential danger that can exploit a vulnerability to breach security.
Attack
An actual attempt to exploit a vulnerability by a threat agent.
Countermeasure
Defensive measures taken to mitigate the impact of threats and attacks.
Computer Misuse
Intentional, unauthorized, and harmful activity involving computers and networks.
Cyberbullying
Harassment, threats, or intimidation of individuals through digital means.
Denial of Service (DoS) Attack
Overloading a system or network to disrupt services.
Phishing Attack
Deceptive emails or messages to trick users into revealing sensitive information.
Data Theft
Unauthorized access and theft of sensitive data.
Identity Theft
Stealing personal information to impersonate someone for financial gain or fraud.
Industrial Espionage
Stealing trade secrets or intellectual property from businesses.
Hardware Firewall
A physical device that filters traffic between a computer network and the internet.
Biometrics
Authentication methods like fingerprint or retina scans for secure access.
Encryption of Data
Encoding data so that it cannot be read by unauthorized users.
Antivirus Software
Programs designed to detect and remove malicious software.
Public Wi-Fi Risks
Using public Wi-Fi can expose sensitive activities to security threats.
Social Media Privacy
Adjusting privacy settings to protect personal information shared online.