1/19
A compilation of key terms and their definitions related to cyber attacks and internet concepts.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Pretexting
Deceiving by pretending to be someone else.
Phishing
Obtaining unauthorized access to data via email.
Spoofing
Someone pretending to be someone else.
Sniffing
Intercepting computer communications.
Usurping
Invading a computer system and replacing legitimate programs with unauthorized programs.
Malware
Software designed to disrupt or damage computers, including viruses, worms, Trojan horses, spyware, and adware.
Bot
A program that automates tasks on the internet, often used for malicious purposes.
Honeypots
False targets set up to lure cyber criminals.
Firewall
A security system that monitors and controls incoming and outgoing network traffic.
Encryption
The process of converting information into a code to prevent unauthorized access.
ISP (Internet Service Provider)
A business that provides individuals and organizations access to the Internet.
Bandwidth
The amount of data that can be transmitted over a network in a given amount of time.
TLD (Top-Level Domain)
The last segment of a domain name, which follows the final dot (e.g., .com, .edu).
Web Server
A computer that delivers requested web pages to users.
Protocol
A standard that defines a set of rules for communication between computers.
URL (Uniform Resource Locator)
The address of a resource on the internet.
VoIP (Voice over IP)
A technology that allows users to make voice calls using the internet.
Netiquette
The code of acceptable Internet behavior.
LAN (Local Area Network)
A network within a limited area such as a home or office.
WAN (Wide Area Network)
A network that spans a large geographic area, often connecting multiple LANs.