Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Cyber Security

TermDefinition
Antivirus software Programs that can block, detect, and remove viruses and other kinds of malware
Backups/backing up files Copies of computer files that can be used to restore files that are lost or damaged
Bandwidth The amount of data that can pass through a network or part of a network per second
Botnet Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer
Computer network Two or more interconnected devices that can exchange data.
Computer virus A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
DDoS A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers
Doxnet A fictional virus modeled after the Stuxnet virus. Is able to damage physical infrastructure
Encryption The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key
Firewall Software designed to block malware from entering protected networks
Hacktivist Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues
Internet service provider (ISP) A company or organization that gives users and devices access to the Internet
Keylogger malware A program that records every key struck on a keyboard and sends that information to an attacker
Malware Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs
Phishing Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations
Ransomware A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back
Server A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages
Software Consists of code written in a programming language that instructs computers to perform specific tasks
Software patch A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program
Software vulnerability A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it
Spam Unsolicited emails sent to many addresses. The purpose of most spam is to make money through advertising or identity theft
USB drive A data storage device that is used to store, back up, and transfer computer files
USB port Connection between devices that can exchange information and power supply
Created by: Ahmed.A
Popular Engineering sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards