• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back

System susceptibility

حساسية النظام

is a malicious act that seeks to damage data, steal data, or disrupt digital life in general.

A Cyber Threat


single actors or groups


financial gain


disruption

Cybercrime

cause panic or fear

Cyberterrorism

Cybereecurity riek is the probability of exposure or loss resulting from a cyber attack or data breach in an organization.

..

is an any malicious software intentionally designed to cause damage to a computer, server, client, or computer network.

Malware

was poesibly one of the first programs that resembled a computer virus. Was written by Bob Thomas

Creeper

was a similar program created by Ray Tomlinson to move across the ARPANET and delete the self- replicating Creeper.

Reaper

is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.

Virus

is a software that aims to gather information about a person or organization

Spyware

is a standalone malware computer program that replicates itself in order to spread to other computers.

A computer worm

is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network.

ARP spoofing