Unit 1: Activities 1.1.1, 1.1.2,1.1.3, 1.1.4 Flashcards
Social media
Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network.
Spam
Irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail.
Phishing
Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
email source
The email address from which the email was sent.
top-level domain
The last segment of a web address; it follows immediately after the last “dot” symbol (.com, .net, .org, .gov)
Malware
Software that is intended to do harm or damage
Social engineering
Process by which an attacker gathers information, through social media or email, about a specific victim and plans a targeted cyber attack.
Cyberteam
A team of individuals working together to investigate cyber events and anomalies.
team norms
Guidelines that team members develop in order to be followed when working together.
Digital Footprint
The trail that you leave behind when you engage in online experiences.
Virtual Machine
An emulation of a computer system
Crack
To guess or discover information, especially a password.
Python Script
A collection of Python code or commands that perform some function.
Brute force attacks
An attempt to discover information through trial and error, guessing as many passwords as possible hoping one is correct.
Dictionary attack
A systematic attempt to crack a password testing with word and phrases found in online dictionaries.