Front | Back |
Any event or action that could cause a loss of or damage to computer hardware, software, data, info or processing capability
|
Computer security risk
|
An online or internet based illegal act
|
Cybercrime
|
Website that evaluates your computer to check for internet and e-mail vulnerabilities
|
Online security service
|
Affects a computer negatively by altering the way the computer works
|
Computer virus
|
Copies itself repeatedly using up resources and possibly shutting down the computer or network
|
Worm
|
A malicious program that hides w/in or looks like a legitimate program
|
Trojan horse
|
Program that hides in a computer and allows someone from a remote location to take full control
|
Rootkit
|
Group of compromised computers connected to a network
|
Botnet
|
Compromised computer
|
Zombie
|
Disrupts computer access to internet services
|
Denial of service attack (DoS attack)
|
A program or set of instructions in a program that allow users to bypass security controls
|
Back door
|
a technique intruders use to make their network or internet transmission appear legitimate
|
Spoofing
|
Hardware and/or software that protects a networks resources from intrusion
|
Firewall
|
Vulnerable computer that is set up to entice an intruder to break into it
|
Honeypot
|
The use of a computer or network w/o permission
|
Unauthorized access
|