Internet Safety & Security Terms

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/22

flashcard set

Earn XP

Last updated 4:37 PM on 3/26/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

23 Terms

1
New cards

Intellectual Property

Property of the mind, including ideas, inventions, and creations such as art and music.

2
New cards

Copyright

An owner's exclusive legal right to reproduce, publish, sell, or distribute their own original work

3
New cards

Fair Use

Allows for the educational use of copyrighted material under specific conditions.

4
New cards

Plagiarism

Copying or using someone else's work and taking credit for it without acknowledging the real author.

5
New cards

Piracy

Illegally copying copyrighted software, music, or movies.

6
New cards

Identity Theft

The fraudulent use of another person's personal information, usually for financial gain.

7
New cards

Encryption

The process of using codes to convert readable information into an unreadable format to protect it from unauthorized access.

8
New cards

Multi-Factor Authentication (MFA) / Two-Factor Authentication (2FA)

A security process that requires users to provide two or more verification factors to gain access to an account, such as a password plus a code sent to a mobile device or a fingerprint scan.

9
New cards

VPN (Virtual Private Network)

A service that creates a secure, encrypted connection over a less secure network, such as the internet. A VPN allows users to send and receive data as if their devices were directly connected to a private network, enhancing both privacy and security.

10
New cards

Malware

Malicious software — an umbrella term that includes viruses, worms, Trojans, ransomware, and other harmful programs.

11
New cards

Computer Virus

Malicious software that enters a computer and negatively affects its ability to run correctly.

12
New cards

Trojan Horse

A computer program that appears to be a helpful or harmless application but causes damage to a computer once downloaded.

13
New cards

Spyware

Malicious software that enters a computer and tracks or gathers personal information without the user's knowledge.

14
New cards

Keylogger Malware

A program that records every key struck on a keyboard and sends that information to an attacker.

15
New cards

Ransomware

A type of malware that holds a victim's computer files hostage by encrypting them. An encrypted code must be purchased to restore access to the files.

16
New cards

Fileless Malware

Malicious activities that use native, legitimate tools built into a system — such as PowerShell or WMI — and operate entirely in memory. Because fileless malware does not leave traditional file signatures, it is difficult for conventional antivirus software to detect.

17
New cards

Phishing

Tricking users into providing sensitive information — such as passwords and bank account numbers — through emails, text messages (smishing), or phone calls (vishing), often by impersonating a trustworthy entity.

18
New cards

Vishing

A type of phishing attack conducted over the phone, where attackers attempt to trick individuals into revealing sensitive personal information.

19
New cards

Cryptojacking

A malicious online threat that hides on a computer or mobile device and uses the machine's resources — such as its CPU and GPU — to mine cryptocurrencies without the user's knowledge or consent.

20
New cards

DDoS (Distributed Denial of Service) Attack

A malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic from multiple compromised computer systems.

21
New cards

Zero-Day Vulnerability

A software or hardware vulnerability that is unknown to the vendor or the public, meaning there are zero days for defenders to prepare before it is exploited by attackers.

22
New cards

AI-Powered Attacks

Cyberattacks that leverage Artificial Intelligence (AI) to enhance their sophistication, automation, and ability to bypass traditional security measures. Examples include AI-driven malware mutations, targeted victim selection, and highly realistic social engineering.

23
New cards

Nation-State Attacks

Cyberattacks orchestrated by government-backed entities to achieve political, economic, or military objectives. These attacks often target critical infrastructure, defense contractors, and key industries.

Explore top notes

note
A1 German Lessons
Updated 263d ago
0.0(0)
note
Chapter 3:Ionic Compounds
Updated 1267d ago
0.0(0)
note
Philosophy Final Exam Review
Updated 1099d ago
0.0(0)
note
Introduction to the Legal System
Updated 587d ago
0.0(0)
note
Biological Molecules
Updated 1039d ago
0.0(0)
note
Practice Final
Updated 527d ago
0.0(0)
note
A1 German Lessons
Updated 263d ago
0.0(0)
note
Chapter 3:Ionic Compounds
Updated 1267d ago
0.0(0)
note
Philosophy Final Exam Review
Updated 1099d ago
0.0(0)
note
Introduction to the Legal System
Updated 587d ago
0.0(0)
note
Biological Molecules
Updated 1039d ago
0.0(0)
note
Practice Final
Updated 527d ago
0.0(0)

Explore top flashcards

flashcards
Science exam Year 8
61
Updated 881d ago
0.0(0)
flashcards
Electromagnetism Physics Vocab
30
Updated 1065d ago
0.0(0)
flashcards
Connect 4, Unit 3
52
Updated 1022d ago
0.0(0)
flashcards
12/14 India + China test
63
Updated 1198d ago
0.0(0)
flashcards
Unit 1 AP GOV
63
Updated 346d ago
0.0(0)
flashcards
Science exam Year 8
61
Updated 881d ago
0.0(0)
flashcards
Electromagnetism Physics Vocab
30
Updated 1065d ago
0.0(0)
flashcards
Connect 4, Unit 3
52
Updated 1022d ago
0.0(0)
flashcards
12/14 India + China test
63
Updated 1198d ago
0.0(0)
flashcards
Unit 1 AP GOV
63
Updated 346d ago
0.0(0)