Something that shows up in a email
Hard to detect both by Users
Identity and Privacy Protection
Someone attempting to create Identity fraud
A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software
The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment. Generally, a data breach results in internal data being made accessible to external entities without authorization.
A security tool, which may be a hardware or software solution that is used to filter network traffic.
A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
he likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization
Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system. Malware includes a wide range of types of malicious programs including: virus, worm, Trojan horse, logic bomb, backdoor, Remote Access Trojan (RAT), rootkit, ransomware and spyware/adware.
The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization. An outsider must often gain logical or physical access to the target before launching malicious attacks.
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. Most SPAM is advertising, but some may include malicious code, malicious hyperlinks or malicious attachments.
A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite. When the host file or MBR is accessed, it activates the virus enabling it to infect other objects. Most viruses spread through human activity within and between computers
a dishonest scheme; a fraud.
The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
A form of malware that monitors user activities and reports them to an external their party. Spyware can be legitimate in that it is operated by an advertising and marketing agency for the purpose of gathering customer demographics. However, spyware can also be operated by attackers using the data gathering tool to steal an identity or learn enough about a victim to harm them in other ways.
An attack focusing on people rather than technology
Alerts used as a warning of danger.
an attempt by hackers to damage or destroy a computer network or system.
a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and .
the ultimate call control center that gives customers full control of all T-Mobile's scam protection options.
Malware is defined as any device software that aims to cause damage and steal data. Malware is an abbreviation for malicious software. Ransomware and trojan, for example, are types of malware widely used in email attacks
particular size, weight and style of a typeface
exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
a small open-fronted hut or cubicle from which newspapers, refreshments, tickets, etc., are sold.
a large printed picture used for decoration.
moral principles that govern a person's behavior or the conducting of an activity.
an information system where documents and other web resources
videos created with original designs, drawings, illustrations or computer-generated effects that have been made to move in an eye-catching way
means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
assembly area where all the parts of a project are put together
any form of media that uses electronic devices for distribution
a picture, design, or the like, printed from an engraved or otherwise prepared block, plate, etc. an indentation, mark, etc
sound within the acoustic range available to humans.
digital optical disc data storage format
computer program that software developers use to create, debug, maintain, or otherwise support other programs and applications.
A computer you can easily carry.
The service the brings internet service to your computer or phone
A machine you can use to write, connect to the internet and play games
Some computers, tablets and phones have this type of screen
A fun way to spend time
A short letter sent by phone
A letter sent on the internet
A small tool which you can use to move your pointer on the computer screen, or a small rodent.
A phone you can carry about with you.
You use this apparatus to write on a computer
A place on the internet which gives you information.
The part of a computer or phone that allows you to see the information.
E-mail name based on discusting meat product
Best method to address unwanted links and emails
Software that is designed to interfere with a computerʼs normal functioning and that can be used to commit cybercrime.
A Virus that encrypts your data and you have to pay to receive the encryption key.
E-mail address to report Cyber-Security concerns
(TWO WORDS) What are rapid and regular network patching, internal firewalls, backups secured off-line, and dual factor authentication a part of?
The technique of sneeking in a security door behind someone who is authorized (Name also used to describe what is done before football games in the parking lot).
(TWO WORDS) When someone uses your personal informaton to obtain gain.
Hardware or software used in an attempt to block cyber attacks (word also used in fire prevention).
(TWO WORDS) A program that surfs the web has artificial intelligence to hack networks
New upgrade for KRGC that allows for users to use any Wi-Fi and any safe website as it encrypts user activity and keeps activity behind a cloud.
Meaning of first "O" in acronym OODA
Meaning of second "O" in acronym OODA
Meaning of "D" in acronym OODA
Meaning of "A" in acronym OODA
Malware that replicates rapidly to slow a system down to make it crash
(TWO WORDS) What you should do if you see ANY anomaly
Technology worn on your body
The NHS provide this service for people.
a person who has the job of watching or noticing particular things.
the act of stopping something from happening or of stopping someone from doing something.
a system that can show the exact position of a person or thing by using signals from satellites
the use of computers to design objects
Short for computer-assisted manufacturing.
a condition or situation that causes problems, especially one that causes something or someone to be less successful than other things or people:
a device that is used to record that something is present or that there are changes in something.
a set of images and sounds, produced by a computer, that seem to represent a place or a situation that a person can take part in
a device containing a wheel that spins freely within a frame, used on aircraft and ships to help keep them horizontal, and as a children's toy
images produced by a computer and used together with a view of the real world
a device that measures acceleration or G-force
you can wear me round your wrist to monitor your health and I rhyme.
encryption that has two key differences
key to secure messaging
communication between two parties has been overheard by someone
services or data become unavailable, unusable or destroyed
unauthorized changing of data or tampering with a service
additional data or activities are generated
transform data to maintain confidentiality and integrity
verify the claimed identity of a user, client or server
verify the requested action is permitted
useful for analysis of a breach and tracking attackers
requiring correct permission to perform an action
list of those with access (acronym)
a collection of permissions assigned to one type of user
the right to perform one action
one of several security mechanisms working together
TLS spelled out
remote procedure call in short
one easy way to design better security
when security features should be addressed in development lifecycle
how to read encrypted messages
sharing one key
how you get a ticket
common network protection at the edge
allows code from known source to be trusted
most widely used system to get the secrets
how an authority takes away past trust
way to check to see if only one bit is set
temporararily loan your access rights
sent as part of a challenge, prevents replay attacks
feature that allows access without logging in repeatedly
last but perhaps most important system concern
gateway that filters traffic and executable code
key to getting a response
ensuring the message was not modified
A device that feeds data into a computer, such as a keyboard or mouse.
code made up of numbers separated by three dots that identifies a particular computer on the Internet
process of converting data into a secret code for transmission over a public network
What is a network security system used to stop unauthorised access
rate at which a processor can complete a processing cycle
data sent to your computer by a Web server that records your actions on a certain Web site
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
Sending an email, posting photos on a social media site and using your webcam.
Usually consists of eight bits.
copy (data) from one computer system to another, typically over the Internet.
A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data.
Is a plug-and-play interface that allows a computer to communicate with peripheral and other devices.
real-time, synchronous, text-based communication via computer
what is it called if people are nasty to you online?
a computer program sent to gather information from your computer
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites.
The act of trying to access someone's information illegally
small program that can be downloaded which allows users to enhance their browser; this allows extra activities of the web
A web address
type of text stlye and size
an intense feeling of fear, shock, or disgust.
the partial or total absence of light.
a large area covered chiefly with trees and undergrowth
a large area covered chiefly with trees and undergrowth
a military stronghold, especially a strongly fortified town
the red liquid that circulates in the arteries and veins of humans and other vertebrate animals, carrying oxygen to and carbon dioxide from the tissues of the body
a large building, typically of the medieval period, fortified against attack with thick walls, battlements, towers, and in many cases a moat.
a large burial ground, especially one not in a churchyard.
a solemn utterance intended to invoke a supernatural power to inflict harm or punishment on someone or something.
an apparition of a dead person which is believed to appear or become manifest to the living, typically as a nebulous image
a dark or shady place
comically or repulsively ugly or distorted.
a long, doleful cry uttered by an animal such as a dog or wolf.
a complicated irregular network of passages or paths in which it is difficult to find one's way; a maze.
something that is difficult or impossible to understand or explain.
an absurd pretense intended to create a pleasant or respectable appearance
a preliminary or preparatory statement; an introduction
an introduction to a book, typically stating its subject, scope, or aims.
not having any serious purpose or value
a very strong wind
cause (someone) to feel embarrassed, ashamed, or humiliated
difficult to carry or move because of its size, shape, or weight
large or heavy and therefore difficult to carry or use; unwieldy
recall and show respect for someone or something
revoke, cancel, or repeal (a law, order, or agreement)
reduce or counteract (something unwelcome or unpleasant) by exerting an opposite force or effect
pay (someone) for services rendered or work done
pay (someone) for services rendered or work done
clever or cunning devices or expedients, especially as used to trick or deceive others; trickery or deviousness
an action intended to deceive someone; a trick
sparing in the use of words; abrupt
(especially of something written or spoken) briefly and clearly expressed
not openly acknowledged or displayed
excitable, nervous, easily frightened
The structure of methods that a society uses to produce and distribute goods and services
The income people receive in return for supplying factors of production
The amount of money a business receives in excess of its expenses
Level of economic prosperity
Any arrangement that allows buyers and sellers to exchange things
An organization that uses resources to produce a product or service, which it then sells
A person or group of people living in a single residence
The arena of exchange in which firms purchase the factors of production from households
A range of economic and political systems based on the belief that wealth should be evenly distributed throughout society
A political system in which the government owns and controls all resources and means of productions and makes all economic decisions
Describing a form of government that limits individual freedoms and requires strict obedience from its citizens
Another name for a centrally planned economy
The doctrine that government generally should not intervene in the marketplace
Property that is owned by individuals or companies, not by the government or the people as a whole
A market-based economic system in which the government is involved to some extent
A period of change in which nation moves from one economic system to another
The incentive that drives individuals and business owners to improve their material well-being
The principle that anyone can compete in the marketplace
The principle that everyone has the same legal rights
The principle that people have the right to control their possessions and use them as they wish
The study of economic behavior and decisions in a nations whole economy
The study of economic behavior and decision-making in small units, such as households or firms
A period of macroeconomic expansion, or growth, followed by one of contraction, or decline
A proposed law submitted directly to the public