Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
12 Cards in this Set
- Front
- Back
System susceptibility |
حساسية النظام |
|
is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. |
A Cyber Threat |
|
single actors or groups financial gain disruption |
Cybercrime |
|
cause panic or fear |
Cyberterrorism |
|
Cybereecurity riek is the probability of exposure or loss resulting from a cyber attack or data breach in an organization. |
.. |
|
is an any malicious software intentionally designed to cause damage to a computer, server, client, or computer network. |
Malware |
|
was poesibly one of the first programs that resembled a computer virus. Was written by Bob Thomas |
Creeper |
|
was a similar program created by Ray Tomlinson to move across the ARPANET and delete the self- replicating Creeper. |
Reaper |
|
is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. |
Virus |
|
is a software that aims to gather information about a person or organization |
Spyware |
|
is a standalone malware computer program that replicates itself in order to spread to other computers. |
A computer worm |
|
is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network. |
ARP spoofing |