1/8
A collection of vocabulary flashcards covering key terms related to cyber-security threats and concepts.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Denial of Service (DoS)
A type of attack aimed at making a digital system unavailable by flooding it with traffic.
Hacking
The act of finding and exploiting weaknesses in a system to gain unauthorized access.
Malware
Malicious software designed to harm, exploit, or otherwise compromise a computer or network.
Ethical Hacking
The practice of intentionally probing a system for vulnerabilities, often with permission, to improve security.
Black Hat Hacker
A hacker who violates computer security for personal gain or malicious intent.
White Hat Hacker
A hacker who uses their skills to improve security and help organizations protect their systems.
Grey Hat Hacker
A hacker who may violate laws or ethical standards but does not have malicious intentions.
Legislation
Laws and regulations related to the use of IT systems, aimed at protecting data and privacy.
Cyber-security
The practice of protecting systems, networks, and programs from digital attacks.