1/22
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Intellectual Property
Property of the mind, including ideas, inventions, and creations such as art and music.
Copyright
An owner's exclusive legal right to reproduce, publish, sell, or distribute their own original work
Fair Use
Allows for the educational use of copyrighted material under specific conditions.
Plagiarism
Copying or using someone else's work and taking credit for it without acknowledging the real author.
Piracy
Illegally copying copyrighted software, music, or movies.
Identity Theft
The fraudulent use of another person's personal information, usually for financial gain.
Encryption
The process of using codes to convert readable information into an unreadable format to protect it from unauthorized access.
Multi-Factor Authentication (MFA) / Two-Factor Authentication (2FA)
A security process that requires users to provide two or more verification factors to gain access to an account, such as a password plus a code sent to a mobile device or a fingerprint scan.
VPN (Virtual Private Network)
A service that creates a secure, encrypted connection over a less secure network, such as the internet. A VPN allows users to send and receive data as if their devices were directly connected to a private network, enhancing both privacy and security.
Malware
Malicious software — an umbrella term that includes viruses, worms, Trojans, ransomware, and other harmful programs.
Computer Virus
Malicious software that enters a computer and negatively affects its ability to run correctly.
Trojan Horse
A computer program that appears to be a helpful or harmless application but causes damage to a computer once downloaded.
Spyware
Malicious software that enters a computer and tracks or gathers personal information without the user's knowledge.
Keylogger Malware
A program that records every key struck on a keyboard and sends that information to an attacker.
Ransomware
A type of malware that holds a victim's computer files hostage by encrypting them. An encrypted code must be purchased to restore access to the files.
Fileless Malware
Malicious activities that use native, legitimate tools built into a system — such as PowerShell or WMI — and operate entirely in memory. Because fileless malware does not leave traditional file signatures, it is difficult for conventional antivirus software to detect.
Phishing
Tricking users into providing sensitive information — such as passwords and bank account numbers — through emails, text messages (smishing), or phone calls (vishing), often by impersonating a trustworthy entity.
Vishing
A type of phishing attack conducted over the phone, where attackers attempt to trick individuals into revealing sensitive personal information.
Cryptojacking
A malicious online threat that hides on a computer or mobile device and uses the machine's resources — such as its CPU and GPU — to mine cryptocurrencies without the user's knowledge or consent.
DDoS (Distributed Denial of Service) Attack
A malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic from multiple compromised computer systems.
Zero-Day Vulnerability
A software or hardware vulnerability that is unknown to the vendor or the public, meaning there are zero days for defenders to prepare before it is exploited by attackers.
AI-Powered Attacks
Cyberattacks that leverage Artificial Intelligence (AI) to enhance their sophistication, automation, and ability to bypass traditional security measures. Examples include AI-driven malware mutations, targeted victim selection, and highly realistic social engineering.
Nation-State Attacks
Cyberattacks orchestrated by government-backed entities to achieve political, economic, or military objectives. These attacks often target critical infrastructure, defense contractors, and key industries.