PBS Nova Cybersecurity Lab Terms

Primary tabs

Pam Koleszar's picture

No Description Set

Bookmark to learn: Login to use bookmarks.

Bookmark to learn: Login to use bookmarks.

Add to collection ... add PBS Nova Cybersecurity Lab Terms to your collections:

Help using Flashcards ...just like in real life ;)

  1. Look at the card, do you know this one? Click to flip the card and check yourself.
  2. Mark card Right or Wrong, this card will be removed from the deck and your score kept.
  3. At any point you can Shuffle, Reveal cards and more via Deck controls.
  4. Continue to reveal the wrong cards until you have correctly answered the entire deck. Good job!
  5. Via the Actions button you can Shuffle, Unshuffle, Flip all Cards, Reset score, etc.
  6. Come back soon, we'll keep your score.
    “Repetition is the mother of all learning.”
  7. Signed in users can Create, Edit, Import, Export decks and more!.

Bookmark to learn: Login to use bookmarks.

Share via these services ...

Email this deck:

Right: #
Wrong: #
# Right & # Wrong of #

antivirus software

computer programs that can block, detect, and remove viruses and other malware

backups / backing up files

extra copies of computer files that can be used to restore files that are lost or damaged

bandwidth

the amount of data that can pass through a network or part of a network per second

botnet

multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn't be achieved with a single computer.

computer network

two or more interconnected devices that can exchange data

computer virus

a computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data

DDoS

a distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers

encryption

the process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.

firewall

software designed to block malware from entering protected networks

hacktivist

someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political and social issues

internet service provider (ISP)

a company or organization that gives users and devices access to the internet

keylogger malware

a program that records every key struck on a keyboard and sends that information to an attacker

malware

software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.

phishing

attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations

ransomware

a type of malware that holds victims' computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victims want their files back.

server

a computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages

software

consists of code written in a programming language that instructs computers to perform specific tasks

software patch

a piece of software designed to update a computer program in order to fix a software vulnerability or improve the program

software vulnerability

a flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it

spam

unsolicited emails sent to many addresses. The purpose of most spam is to make money through advertising or identity theft.

USB drive

a data storage device that is used to store, back up, and transfer computer files

USB port

a type of connection between devices that can exchange information and power supply