2024

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Computer Security

Activities related to identifying, assessing and managing vulnerabilities, threats, and attacks on a computer system.

2
New cards

Vulnerability

Exposure to the possibility of being harmed or attacked.

3
New cards

Threat

A statement of intention to harm.

4
New cards

Attack

Actual action that causes damage or harm.

5
New cards

Countermeasure

An action taken to counteract a threat.

6
New cards

Computer Misuse

Any activity during which a computer system's data is accessed, modified or deleted without proper authorization.

7
New cards

Cyberbullying

A form of harassment or bullying in an online space, which includes insulting comments or sharing embarrassing content.

8
New cards

Identity Theft

The deliberate use of someone else's identity, usually to gain financial advantage.

9
New cards

Phishing Attacks

Attempts to steal sensitive information through fake emails pretending to be from trusted organizations.

10
New cards

Privacy Violations

Breaches of the right of individuals to control their personal information.

11
New cards

Copyright Infringement

Reproducing, distributing, or benefiting from copyrighted works without permission.

12
New cards

Software Piracy

The unauthorized reproduction or distribution of software products.

13
New cards

Data Theft

The unauthorized copying or removal of data from a legitimate owner's computer system.

14
New cards

Denial of Service Attack

A cyber-attack intended to prevent a service being delivered by the target system.

15
New cards

Malware

Software designed to disrupt, damage, or gain unauthorized access to a computer system.

16
New cards

Electronic Eavesdropping

Intercepting communications without knowledge or consent of participants.

17
New cards

Cybercrime

Any crime carried out using computers and networks.

18
New cards

Cybersecurity

Technologies, processes, and practices designed to protect systems from attack, damage, or unauthorized access.

19
New cards

IPO Chart

A diagram that breaks down a problem into Input-Process-Output.

20
New cards

Variable

A container that stores values capable of changing during processing.

21
New cards

Constant

A container with a value that cannot be changed during processing.

22
New cards

Algorithm

A sequence of instructions that defines a solution to a problem.

23
New cards

Relational Operators

Operators that test the relationship between two values and result in true or false.

24
New cards

Arithmetic Operators

Symbols representing mathematical computations like addition, subtraction, multiplication, and division.

25
New cards

Conditional Branching

Performing actions based on specific situations or conditions.

26
New cards

Nested Conditions

Conditional statements within other conditional statements.