Unit 7 Vocab Flashcards
A desktop computer or workstation that is capable of obtaining resources from a server
client
described characteristics of the culture of computers, information technology, and virtual reality
cyber
a person who conducts illegal activity using computers of other digital technology
cybercriminal
a crime that involved a computer and network
cybercrime
is a set of moral, legal, and social principles that applied to computers relating to the user’s behavior
cyber ethics
the environment that allows digital technology of many forms to communicate with one another via the internet
cyberspace
the collection of security tool, policies, safeguard, and practices that protect the cyberspace environment and its occupants
cyber security
the use of technology to attack a nation via network communications and computer devices
cyberwarfare
a world wide collection of different networks connecting millions of devices which allows communication between other devices on the network
internet
a channel that links computers, servers, network devices, peripherals, or other devices together to allow the sharing of data
network
a connection point that relays information along a distributed network
nodd
a process if arranging data into small units that can be transmitted over a digital network
packet switching
a computer program or a device that provides sharable resources
server
software that automatically displays or downloads advertising material (often unwanted) when a user is online
Adware
criminlas who break into computer netwroks and systems with malicious intent
Black Hat Hackers
software application that disguises itself as an innocent program of file, produces copies of itself and inserts into other software applications, and that when run performs a malicious action such as destroying data or damaging software
Computer Virus
a standalone self-replicating software application that invades computers on a network and usually performs a destructive action
Computer Worm
malicious attempts by hackers to damage, steal, or destroy a computer network or system
Cyberattacks
a cyberattack in which the perpetrator seeks to make a machine or network resource unavaliable or to disrupt services connected to the Internet
Denial of Service Attack (DoS)
occurs when an unauthorized user interceots a private communication, such as a phone call, instant message, video conference, or email
Eavesdropping
an act of performing penetration tests on a system or network ro find loopholes and vulnerabilities that a malicious attacker might use to their advantage to cause loss or damages
Ethical Hacking
an individual who may sometimes violate laws or ethical standards, but does not have the malicious intent typical of a black hat hacker
Gery Hat Hacker
the act of using a computer to gain unauthorized access to data in a system
Hacking
someone who uses a computer to gain unauthorized accesss to data in a system
Hacking
someone who uses a computer to gain unauthorized acces to systems or networks
Hacker
a tool that records or logs every keystroke on a computing device
Keylogger
malicious software that attackers use to block access to a computer system until the user pays a certain amount of money
Ransomware
the practice of sending fraudulent emails or text messages posing as a legitimate source in order to deveive individuals into revealing personal information, such as passwords and credit card numbers
Phinishing
occurs when an unauthorized user takes over an active communication session without the user’s permission
Session Hijacking