Download Open ended challenge rationale

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Unix security wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Carrier IQ wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Operation AntiSec wikipedia , lookup

Computer virus wikipedia , lookup

Trusted Computing wikipedia , lookup

Hacker wikipedia , lookup

Antivirus software wikipedia , lookup

Computer security wikipedia , lookup

Cyberattack wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Social engineering (security) wikipedia , lookup

Cybercrime wikipedia , lookup

Mobile security wikipedia , lookup

Malware wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Cybersecurity in the Primary School
Glossary of terms
Word/Term
Antivirus software
Denial of Service
Attack (DOS)
Encryption
Definition
A program that will prevent, detect and fix malware infections on your computing
device or network.
An attempt to make a website unavailable to its users by attacking the servers of the
site. A DDOS (Distributed Denial of Service) attack is where multiple IP addresses
attack the server.
The transformation of data to symbols or random letters to hide its information
content. Encryption requires decryption to release the information
Firewall
Hardware or software designed to prevent unauthorised access to a computer or
network from another computer or network.
Hacker
Someone who violates computer security for malicious reasons, status or personal
gain
Keyboard logger
A virus or physical device that logs keystrokes to secretly capture private
information such as passwords or credit card details.
Malware
Software intended to infiltrate and damage or disable computers. Shortened form of
malicious software.
Phishing
Method used by criminals to try to obtain financial or other confidential information
(including user names and passwords) from internet users, usually by sending an
email that looks as though it has been sent by a legitimate organization (often a
bank). The email usually contains a link to a fake website that looks authentic.
Screen scraper
A virus or physical device that logs information sent to a visual display to capture
private or personal information.
Spam
Spyware
Unsolicited messages sent over the Internet, typically to large numbers of users, for
the purposes of advertising, phishing or spreading malware
Malware that passes information about a computer user’s activities to an external
party.
Trojan
A program in which malicious or harmful code is contained inside apparently
harmless programming. Often sent as part of a computer virus.
Virus
Malware that is loaded onto a computer and then run without the user’s knowledge
or knowledge of its full effects.
Worm
Malware that replicates itself so it can spread to infiltrate other computers.
lead ▪ learn ▪ protect ▪ engage
www.somersetelim.org