Ovido
Taal
  • Engels
  • Spaans
  • Frans
  • Portugees
  • Duits
  • Italiaans
  • Nederlands
  • Zweeds
Tekst
  • Hoofdletters

Gebruiker

  • Inloggen
  • Account aanmaken
  • Upgrade naar Premium
Ovido
  • Startpagina
  • Inloggen
  • Account aanmaken

FBLA COMP CPU SCI: Cyber Security and Impact :1:@1

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

Virus

Tricking/Deceiving Someone into giving you private information or data

Social Engineering

Attacker gets access by using an exploit to access the system

Backdoor

software that obtains information about another computer's activities without knowledge of the user

Spyware

is an email or electronic communications scam targeted towards a specific individual, organization or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user's computer.

Spear Phishing Attack

Denial of Service: an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.

DOS

Distributed Denial of Service: occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a botnet) flooding the targeted system with traffic.

DDOS

a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, used to send spam messages, ddos attacks, mine for cryptocurrency, and more

Botnet

looking through trash to obtain sensitive information

Dumpster Diving

malicious software that blocks access to computer until an amount of money is paid

Ransomware

software intended to harm computers, networks, people, or businesses

Malware

Downloads installed by just passing through an infected webpage

Drive-by Download

sending many emails to a target to flood the inbox and take down the server

E-mail flooding

a virus disguised as real software, to make it appear harmless so victims download and run it

Trojan Horse

a self-replicating virus that does not usually alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.

Worm

also referred to as DNS cache poisoning, is a form of computer hacking in which corrupt Domain Name System data is introduced into a DNS resolver's cache, causing the name server to return an incorrect IP address, which results in diverting traffic to the attacker's computer (or any other computer).

DNS spoofing

Malware which tricks users into buying fake antivirus protection

Scareware

A hacker who does good. Tests security systems with consent of the owners.

White Hat

A hacker who uses their abilities for malicious purposes such as breaching and bypassing internet secuirty.

Black Hat

Someone who uses computers to cause severe damage or widespread fear in society.

Cyberterrorist

a computer hacker whose activity is aimed at promoting a social or political cause.

Hacktivist

the use of computer networks to gain illicit access to confidential information, typically that held by a government or other organization.

Cyberespionage

Bots can send spam attacks, dos attacks, and others. Malware ran on a computer can let the attacker place these on computers which once infected are called zombies.
A collection of bots all controlled by one person is called a botnet, commonly used for DDOS attacks

Bots

a program used to guess a users password, using lists of keywords and common passwords.

Password Cracker

Malware that displays ads when the user is on the internet, and can collect marketing data without the user's knowledge. Adware can also redirect a search request.

Adware

allows individuals to capture data as it is transmitted over a network and is used by network professionals to diagnose network issues, and by malicious users to capture unencrypted data, like passwords and usernames.

Sniffing

a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.

Script Kiddie

the use of a key that an attacker has stolen to gain access to a secured transmission. The key allows the attacker to decrypt the data that is being sent. The sender and receiver are usually not aware of the attack.

Compromised Key Attack

computer systems that block, detect, and remove viruses and other malware

Antivirus

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

Firewall

Quiz
saistību tiesības (Jēdzieni)
Maja
FBLA COMP CPU SCI: Computer literacy and Systems:1:@4
FBLA COMP CPU SCI: Computer literacy and Systems:1:@3
sammenligningsprøve
FBLA COMP CPU SCI: Computer literacy and Systems:1:@2
FBLA COMP CPU SCI: Computer literacy and Systems:1:@1
kardiologi
zäkra jobb
stojamiesiems fizikiniai dydziai
latin vocabulaire p.70
identities and derivatives
filosofia
Mi presento
voc anglais car
Eras GeologíaPrecámbrico, Paleozóico, Mesozóico o Cenozóico?
p 143-144 fransniet zeker of te kennen om examen want op toets niet dus vragen.
Réspiration cellulaire
les 14 synoniemen
Structure d'un gène
Nutriments, vitamines et enzymes
새 단어 7과 3급
Organisk kemi- frågor från målbeskrivning åk 8
spritz
5.1 Olika former av kol åk 8
Lamb to the Slaughter Vicabulary
Unit 8 words
Examen Yael
bio 30 urinary system
halal part2
지역단어
JLPT N5Vocabulario completo N5 (700 aprox)
Fysik/begrepp
histoire chap 3
Parcial Derecho
Frans so
ecology - copy
gaspillage et recyclage - copy
ap
vokeciu
italiano
Wurzeln
Mathe Wurzeln - Kopie
Examen pasen 2025
samhällskunskapkom ihåg orden
enhelska v 13
Test
Mathe Wurzeln
HYPERTHYROIDISM
MS2SIPAGAN MO PLSSS
samengestelde symbolen
5.7 Estrar åk 8
eigenschaften
drinkar alkohol
rm mid 2
drinkar 0%
HALAL part 1
3. kolokvij
tenta sjukdomstillstånd
Notion de tissus
Le cycle cellulaire
maths dérivés 13
A christmas carol Extended
Les gène : transcription et traduction
Les lipides
Les glucides
sprok projekt
Latinčina
science words 2
Genetik
Comp Sci Just study this Ok? Part 3
Comp Sci Just study this Ok? Part 2
Comp Sci Just study this Ok? Part 1
Ipm 2
ans test 2
passe simple
AIS
INTERMEDIATE ACCOUNTING 2
ES
Travelling
Traduce_week_12_2
latin
teste
shywiys
tyska v.13
Structure phrase
economie hoofdstuk 6
latijn examenwoorden moeilijk
EMC-Justice
sagaspurningar
Nw
simple efficace
mot
duits: dativ,akkusativ, nominativ
Funcionament (olimpiades)
ecology
Ethics mid 3
Gaia
Ethics mid 2
새로운 단어 6과 3급
Ethics mid 1
Proffieee
Bulgarian food
IPM - copy
Geschichte
ROSTROS DE LA CULPA
B2
fysik begrepp
Ndls
CIRCUNSTANCIAS DE RESPONSABILIDAD MEDICA
ELEMENTOS CONSTITUTIVOS DE LA RESPONSABILIDAD MEDICA
week 10-acne trts - copy
Controle de musique
مبانی زیبایی شناسی
Englisch
سه بعدی صحنه ای
Type d'entreprises
Directions (BBC Learn English)
stojamiesiems lasteles
Woordenschat duits
Histoire 3U
Clases marzo 2
15.5 Geld en bankwezen
chemistryI have a chem test on atmosphere and atmospheric pollutants
IPM
latin
Unit 9
Unit 8
Unit 7
Unit 6
Ekonomistyrning frågor
Ar Jhay
test 3
test 2
FBLA Intoduction to Technolgy Part 2 Section 2
FBLA Intoduction to Technolgy Part 2 Section 1
FBLA Intoduction to Technolgy Part 1 Section 4
FBLA Intoduction to Technolgy Part 1 Section 3
FBLA Intoduction to Technolgy Part 1 Section 2
FBLA Intoduction to Technolgy Part 1 Section 1
VAE300
Fysik/begrepp
Fysik/frågor
15.4 Handel, dienstverlening en verzekeringen
15.3 Onderneming
15.2 Industrie, ambacht en techniek
15.1 Landbouw, visserij, mijnbouw
chap.10 vocab
French Sentences
انیمیشن ها و سازنده و ژانر
BlankaFrench
Svenska
europe apres le moyenne age
The Story On Job
microbes
microbes biooooo
Poesia trovadoresca
Family (THEORIES)
Family (CHILDHOOD)
vocabulario 4
NP 1 - copie
NP 1 - copy
NP 1 - copie
KLAR- Blodets sjukdomar
KLAR- Respiratoriska sjukdomar
KLAR- Cirkulationsystemets sjukdomar
KLAR Endokrina sjukdomar
KLAR- Rörelseapparatens sjukdomar
KLAR Cellskada sjukdomar
Indigenous People
KLAR Inflammation sjukdomar
KLAR- Nervsystemets sjukdomar
Engels
Julain
Unit 5
masters of recall
sacramenten godsdienstsacramenten godsdienst
ingles tema 1
Born a crime 4
polski
Deutsch
Family (COUPLES)
nyckeltal :(
Digital Communication
شیوه های کاربردی و تزئینی خوشنویسی
trabalho
خوشنویسی در سده های مختلف جدول ص ۲۱۸
ekonomistyrning
Plant disease
Unit 5- Vocanulary
L.J
vocaboulary 3
Juhn Hwahn Bup (Spinning Techniques)
Gahk Doh Bup
german 47
german 46
tema5.1
year code
month code
plu-koder
Microbiologi 7
Microbiologi 6
Management Science
problèmatique
Chapter 6 Review Questions
histoire exam
pr
Spanska verb
begrepp
biologi
glosor marsh
PolitikSoziale Ungerechtigkeit
verbe
so 3/19
Unité 4Nichts
unit 2
int
VOCABULARIO TEMA 15🟣
VOCABULARIO TEMA 14🔴
VOCABULARIO TEMA 13🟡
VOCABULARIO TEMA 11🟤
beco H10 t/m H15
History - copy
la nazificacion de Alemania
CSS 4 Lesson 2
History
PE 3rd q
Religion quiz 4
stats
primer examen
Mikrobiologi 5
Microbiologi 4
정신 단어
gaspillage et recyclage
crime and punishment
stalin
PSYC-2019 Quiz 3
ruotsin iso epäsäännölliset verbit sanakoe
primer examen
esta
Chemie
Glosor till 21/3
v12 engelska
dance by skye mead
NO-Prov
Carlos B.- Mod 5
Genera scientific names
unregel. Verben Vergangenheit
Genera ID
Tribe ID