Looks like no one added any tags here yet for you.
Computer Security
Activities related to identifying, assessing and managing vulnerabilities, threats, and attacks on a computer system.
Vulnerability
Exposure to the possibility of being harmed or attacked.
Threat
A statement of intention to harm.
Attack
Actual action that causes damage or harm.
Countermeasure
An action taken to counteract a threat.
Computer Misuse
Any activity during which a computer system's data is accessed, modified or deleted without proper authorization.
Cyberbullying
A form of harassment or bullying in an online space, which includes insulting comments or sharing embarrassing content.
Identity Theft
The deliberate use of someone else's identity, usually to gain financial advantage.
Phishing Attacks
Attempts to steal sensitive information through fake emails pretending to be from trusted organizations.
Privacy Violations
Breaches of the right of individuals to control their personal information.
Copyright Infringement
Reproducing, distributing, or benefiting from copyrighted works without permission.
Software Piracy
The unauthorized reproduction or distribution of software products.
Data Theft
The unauthorized copying or removal of data from a legitimate owner's computer system.
Denial of Service Attack
A cyber-attack intended to prevent a service being delivered by the target system.
Malware
Software designed to disrupt, damage, or gain unauthorized access to a computer system.
Electronic Eavesdropping
Intercepting communications without knowledge or consent of participants.
Cybercrime
Any crime carried out using computers and networks.
Cybersecurity
Technologies, processes, and practices designed to protect systems from attack, damage, or unauthorized access.
IPO Chart
A diagram that breaks down a problem into Input-Process-Output.
Variable
A container that stores values capable of changing during processing.
Constant
A container with a value that cannot be changed during processing.
Algorithm
A sequence of instructions that defines a solution to a problem.
Relational Operators
Operators that test the relationship between two values and result in true or false.
Arithmetic Operators
Symbols representing mathematical computations like addition, subtraction, multiplication, and division.
Conditional Branching
Performing actions based on specific situations or conditions.
Nested Conditions
Conditional statements within other conditional statements.