What is digital security risk?
What is computer crime?
What is cybercrime?
What has a higher degree of security risk than information kept in organizations
What malware doesn’t replicate itself on other computers?
What is a malware that hides within / looks like legitimate program?
What malware copies itself repeadatedly, using up resources and possibly shutting doen computer or network?
What malware is a potentially damaging computer program which can spread and damage files?
What malware is delivered when we open file, run infected program or boot computer with infected disk in disk drive?
List out the type of malware ( 7 )
What is a program that displays an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages, or other internet services
What is a malware that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money
What is a malware that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device?
What is a malware placed on a computer / mabile device without user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online?
List out the internet and network attacks ( 5 )
What network attack is a group of compromised computers or mobile devices connected to a network
What network attack is a compromised computer or device?
What network attack is disrupts computer access to an Internet Service ?
What network attack is a larger scale or a DOS?
What network attack is a program or set of instructions in a program that allow users to bypass security controls?
What association assists with DDOS attacks?
What does hacker uses to send an influx of confusing date messages to execute attack on other systems?
How does virus spread? ( 3 )
What is a macro virus?