What is cyber security
America victims in 2016 alone lost up too _____________ due to online fraud cases.
1.3 billion dollars
There are ____________ unfilled positions in the cyber security field.
300,000
In 2016 American Companies and Institutions lost _______________ due to cyber crime.
9 billion dollars
exploit
A malicious application or script that can be used to take advantage of a computer's vulnerability.
Virus
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
software?
A set of programs that tell a computer to perform a task. These instructions are compiled into a package that users can install and use. For example, Microsoft Office is an application software.
IP address
An internet version of a home address for your computer, which is identified when it communicates over a network; For example, connecting to the internet (a network of networks).
What kind of information is sent over the internet?
Everything
True or False: Learning computer science or coding is only useful if you want to become a professional programmer.
False
How do you prevent cyber attacks?
Firewalls, Strong passwords, Respond quickly to possible attacks.
Ransomware
Software that encrypts programs and data until a ransom is paid to remove it.
breach
The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
True or false: IoT devices increase our vulnerability to cyber attacks.
True
VPN (Virtual Private Network)
a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network
Firewall
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
Trojan Horse
a program designed to breach the security of a computer system while ostensibly performing some innocuous function.
worm
a software program capable of reproducing itself that can spread from one computer to the next over a network
Malware
software that is intended to damage or disable computers and computer systems.
What is the internet of things?
the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
What is cyber security?
the techniques of protecting computers, networks, programs and data from unauthorized access or attacks