The process of verifying that you are who you say you are
A string of characters that allows access to a computer, interface, or system.
A collection of internet-connected programs communicating with other similar programs in order to perform tasks. Botnets can be used to send spam or participate in a Distributed Denial of Service attacks.
Advertising software that automatically generates advertisements. It can be legitimately developed software but in some cases it can pose a threat.
Application used to prevent infection from risks.
A physical device or application designed to deny incoming or outgoing traffic on a network.
An attempt to make a machine or network resource unavailable to its intended users
It is a type of malware that collects user information by tracking the habits of users
It is malicious software meant to gain access, disrupt computer operation, or gather sensitive information.
The act of masquerading as a trustworthy website or email to acquire user information; identity theft is the intent
It is a person who gains unauthorized access to a computing device or network.
Computer program hidden within the shell of another program with an alternative intent such as a virus.
Software that uses computer networks and security holes to replicate itself.
A piece of software that attaches itself to computer programs; viruses replicate and typically have a payload
An attempt to use another person's identity to commit a crime.
Teachers: Create FREE classroom games with your questions Click for more info!
©2007-2024 Review Game Zone | About | Privacy | Contact | Terms | Site Map
©2007-2024 Review Game Zone | About | Privacy | Contact | Terms | Site Map