Software that compromises the operation of a system by performing an unauthorized function or process.
Synonym(s): malicious code, malicious applet, malicious logic
_____refers to a system of interrelated, internet-connected objects that are able to collect and transfer data over a wireless network without human intervention.
_____ computing is a model for enabling on-demand network access to a shared pool of configurable computing capabilities or resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system
A circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact (create adverse consequences for) organizational operations, organizational assets (including information and information systems), individuals, other organizations, or society.
a short-range radio technology (or wireless technology) aimed at simplifying communications among internet devices and between devices and the internet.
____software used to prevent, scan, detect and delete viruses from a computer.
The process of transforming plaintext into ciphertext
a type of malicious software cyber criminals use to block you from accessing your own data. The digital extortionists encrypt the files on your system and add extensions to the attacked data and hold it “hostage” until the demanded ransom is paid.
A capability to limit network traffic between networks and/or information systems
A _____ is a small piece of text sent to your browser by a website you visit. It helps the website to remember information about your visit, like your preferred language and other settings.
A state in which information has remained unaltered from the point it was produced by a source, during transmission, storage, and eventual receipt by the destination.
A digital form of social engineering to deceive individuals into providing sensitive information.
Nick Espinosa's 3rd law of Cyber Security states: "Humans _____ even when they shouldn't".
is a commonly used method of website protection against spamming bot activity. It is a free human verification system that protects the website from various types of abuse.
_____security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.