* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Open ended challenge rationale
Survey
Document related concepts
Unix security wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Operation AntiSec wikipedia , lookup
Computer virus wikipedia , lookup
Trusted Computing wikipedia , lookup
Antivirus software wikipedia , lookup
Computer security wikipedia , lookup
Cyberattack wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Social engineering (security) wikipedia , lookup
Transcript
Cybersecurity in the Primary School Glossary of terms Word/Term Antivirus software Denial of Service Attack (DOS) Encryption Definition A program that will prevent, detect and fix malware infections on your computing device or network. An attempt to make a website unavailable to its users by attacking the servers of the site. A DDOS (Distributed Denial of Service) attack is where multiple IP addresses attack the server. The transformation of data to symbols or random letters to hide its information content. Encryption requires decryption to release the information Firewall Hardware or software designed to prevent unauthorised access to a computer or network from another computer or network. Hacker Someone who violates computer security for malicious reasons, status or personal gain Keyboard logger A virus or physical device that logs keystrokes to secretly capture private information such as passwords or credit card details. Malware Software intended to infiltrate and damage or disable computers. Shortened form of malicious software. Phishing Method used by criminals to try to obtain financial or other confidential information (including user names and passwords) from internet users, usually by sending an email that looks as though it has been sent by a legitimate organization (often a bank). The email usually contains a link to a fake website that looks authentic. Screen scraper A virus or physical device that logs information sent to a visual display to capture private or personal information. Spam Spyware Unsolicited messages sent over the Internet, typically to large numbers of users, for the purposes of advertising, phishing or spreading malware Malware that passes information about a computer user’s activities to an external party. Trojan A program in which malicious or harmful code is contained inside apparently harmless programming. Often sent as part of a computer virus. Virus Malware that is loaded onto a computer and then run without the user’s knowledge or knowledge of its full effects. Worm Malware that replicates itself so it can spread to infiltrate other computers. lead ▪ learn ▪ protect ▪ engage www.somersetelim.org