cybersecurity

?
what is a virus
a virus is a self replicating form of malware that attaches to your network by email links or confirmation buttons
1 of 9
what is a worm
worms are also a form of self replicating malware, however they replicate by spreading into your files and using your system
2 of 9
what is a Trojan
a Trojan is a deceiving form of malware that attaches to your software by deceiving as innocent websites or games, Trojans can be used as a backdoor for hackers to enter your devise
3 of 9
what is the thing that companies and average people have that hackers want
data and information
4 of 9
what is a captcha
a captcha is the verification apps have to make sure you are a human and not a robot
5 of 9
what does a firewall do
a firewall checks incoming and outgoing network traffic to check that its data does not contain anything malicious
6 of 9
what are biometrics
biometrics are a form of password that does not require typing, such as finger prints or face id
7 of 9
what is an anti-malware
an antimalware is a form of software that scans any file that is able to execute a code, anti malwares are aware of the sequences of code that contain malicious content, and if they come in contact with a file that follows said codes they will quarantine
8 of 9
what is user permission
user permission are privileges or restrictions that vary between groups of people, especially in companies and schools, that restrict which websites, printers, networks and software's a said group of people are allowed to access
9 of 9

Other cards in this set

Card 2

Front

what is a worm

Back

worms are also a form of self replicating malware, however they replicate by spreading into your files and using your system

Card 3

Front

what is a Trojan

Back

Preview of the front of card 3

Card 4

Front

what is the thing that companies and average people have that hackers want

Back

Preview of the front of card 4

Card 5

Front

what is a captcha

Back

Preview of the front of card 5
View more cards

Comments

edwineholland

Report

Good presentation. I liked it. It will be good if you can add more information about how to secure your phone and computer from different attacks. Also, it will be good to know more about how can I spy on an iPhone without installing software on the target phone and how to protect myself from spying. 

Similar Computing resources:

See all Computing resources »See all cybersecurity resources »