computer security
an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack
DDOS
The acronym DDoS stands for
Distributed denial of service
a group of compromised computers controlled by a hacker is called a
botnet
a small text or file of information created by websites you visit that your web browser stores on your hard disk is called a(n)
cookie
a crime in which a computer is the object of the crime or is used to commit a crime or offense is called
cybercrime
a person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a
cyberterrorist
which of the following would be considered a cyber crime
data manipulation
hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a
firewall
a person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a
hacker
the act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called
hacktivism
firewall software used to block a user's access to specific internet content is called a(n) _____ filter
internet
a form of spyware that records all actions typed on a keyboard is called a _____ logger
keystroke
what is the name of a virus written in a macro language and placed within a document or spreadsheet
macro virus
cookies stored on a a computer's hard drive and used to collect data and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ____ cookies
persistent
a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called
pharming
specialized hardware or software systems capture packets transmitted over a network are called packet
sniffers
an unsolicited email message is called
spam
persistent cookies store information about
user preferences
software that infects a computer and is created using computer code is called a computer
virus
software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called
adware
the malicious use of computer code to modify the normal operations of a computer or network is called a (n)
cyberattack
harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called
cyberbullying
non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called
white hat hackers
a destructive program that replicates itself throughout a single computer across a network is called
worm
a computer controlled by a hacker is called a
zombie