computer security
an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack
DDOS
The acronym DDoS stands for
Distributed denial of service
software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called
adware
a group of compromised computers controlled by a hacker is called a
botnet
a small text or file of information created by websites you visit that your web browser stores on your hard disk is called a(n)
cookie
the malicious use of computer code to modify the normal operations of a computer or network is called a (n)
cyberattack
harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called
cyberbullying
a crime in which a computer is the object of the crime or is used to commit a crime or offense is called
cybercrime
a person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a
cyberterrorist
which of the following would be considered a cyber crime
data manipulation
hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a
firewall
a person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a
hacker
the act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called
hacktivism
firewall software used to block a user's access to specific internet content is called a(n) _____ filter
internet
a form of spyware that records all actions typed on a keyboard is called a _____ logger
keystroke
what is the name of a virus written in a macro language and placed within a document or spreadsheet
macro virus
cookies stored on a a computer's hard drive and used to collect data and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ____ cookies
persistent
a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called
pharming
specialized hardware or software systems capture packets transmitted over a network are called packet
sniffers
an unsolicited email message is called
spam
persistent cookies store information about
user preferences
software that infects a computer and is created using computer code is called a computer
virus
non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called
white hat hackers
a destructive program that replicates itself throughout a single computer across a network is called
worm
a computer controlled by a hacker is called a
zombie