Ovido
Idioma
  • Inglés
  • Español
  • Francés
  • Portuguesa
  • Alemán
  • Italiana
  • Holandés
  • Sueco
Texto
  • Mayúsculas

Usuario

  • Iniciar sesión
  • Crear cuenta
  • Actualizar a Premium
Ovido
  • Inicio
  • Iniciar sesión
  • Crear cuenta

FBLA COMP CPU SCI: Cyber Security and Impact :1:@1

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

Virus

Tricking/Deceiving Someone into giving you private information or data

Social Engineering

Attacker gets access by using an exploit to access the system

Backdoor

software that obtains information about another computer's activities without knowledge of the user

Spyware

is an email or electronic communications scam targeted towards a specific individual, organization or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user's computer.

Spear Phishing Attack

Denial of Service: an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.

DOS

Distributed Denial of Service: occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a botnet) flooding the targeted system with traffic.

DDOS

a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, used to send spam messages, ddos attacks, mine for cryptocurrency, and more

Botnet

looking through trash to obtain sensitive information

Dumpster Diving

malicious software that blocks access to computer until an amount of money is paid

Ransomware

software intended to harm computers, networks, people, or businesses

Malware

Downloads installed by just passing through an infected webpage

Drive-by Download

sending many emails to a target to flood the inbox and take down the server

E-mail flooding

a virus disguised as real software, to make it appear harmless so victims download and run it

Trojan Horse

a self-replicating virus that does not usually alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.

Worm

also referred to as DNS cache poisoning, is a form of computer hacking in which corrupt Domain Name System data is introduced into a DNS resolver's cache, causing the name server to return an incorrect IP address, which results in diverting traffic to the attacker's computer (or any other computer).

DNS spoofing

Malware which tricks users into buying fake antivirus protection

Scareware

A hacker who does good. Tests security systems with consent of the owners.

White Hat

A hacker who uses their abilities for malicious purposes such as breaching and bypassing internet secuirty.

Black Hat

Someone who uses computers to cause severe damage or widespread fear in society.

Cyberterrorist

a computer hacker whose activity is aimed at promoting a social or political cause.

Hacktivist

the use of computer networks to gain illicit access to confidential information, typically that held by a government or other organization.

Cyberespionage

Bots can send spam attacks, dos attacks, and others. Malware ran on a computer can let the attacker place these on computers which once infected are called zombies.
A collection of bots all controlled by one person is called a botnet, commonly used for DDOS attacks

Bots

a program used to guess a users password, using lists of keywords and common passwords.

Password Cracker

Malware that displays ads when the user is on the internet, and can collect marketing data without the user's knowledge. Adware can also redirect a search request.

Adware

allows individuals to capture data as it is transmitted over a network and is used by network professionals to diagnose network issues, and by malicious users to capture unencrypted data, like passwords and usernames.

Sniffing

a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.

Script Kiddie

the use of a key that an attacker has stolen to gain access to a secured transmission. The key allows the attacker to decrypt the data that is being sent. The sender and receiver are usually not aware of the attack.

Compromised Key Attack

computer systems that block, detect, and remove viruses and other malware

Antivirus

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

Firewall

Cuestionario
saistību tiesības (Jēdzieni)
Maja
FBLA COMP CPU SCI: Computer literacy and Systems:1:@4
FBLA COMP CPU SCI: Computer literacy and Systems:1:@3
sammenligningsprøve
FBLA COMP CPU SCI: Computer literacy and Systems:1:@2
FBLA COMP CPU SCI: Computer literacy and Systems:1:@1
kardiologi
zäkra jobb
stojamiesiems fizikiniai dydziai
latin vocabulaire p.70
identities and derivatives
filosofia
Mi presento
voc anglais car
Eras Geología
p 143-144 frans
Réspiration cellulaire
les 14 synoniemen
Structure d'un gène
Nutriments, vitamines et enzymes
새 단어 7과 3급
Organisk kemi- frågor från målbeskrivning åk 8
spritz
5.1 Olika former av kol åk 8
Lamb to the Slaughter Vicabulary
Unit 8 words
Examen Yael
bio 30 urinary system
halal part2
지역단어
JLPT N5
Fysik/begrepp
histoire chap 3
Parcial Derecho
Frans so
ecology - copy
gaspillage et recyclage - copy
ap
vokeciu
italiano
Wurzeln
Mathe Wurzeln - Kopie
Examen pasen 2025
samhällskunskap
Test
Mathe Wurzeln
HYPERTHYROIDISM
MS2
samengestelde symbolen