maximum unambiguous range
pulse repetition interval
main bang eclipsing
speed of light
Something that shows up in a email
Hard to detect both by Users
Identity and Privacy Protection
Someone attempting to create Identity fraud
A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software
The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment. Generally, a data breach results in internal data being made accessible to external entities without authorization.
A security tool, which may be a hardware or software solution that is used to filter network traffic.
A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
he likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization
Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system. Malware includes a wide range of types of malicious programs including: virus, worm, Trojan horse, logic bomb, backdoor, Remote Access Trojan (RAT), rootkit, ransomware and spyware/adware.
The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization. An outsider must often gain logical or physical access to the target before launching malicious attacks.
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. Most SPAM is advertising, but some may include malicious code, malicious hyperlinks or malicious attachments.
A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite. When the host file or MBR is accessed, it activates the virus enabling it to infect other objects. Most viruses spread through human activity within and between computers
a dishonest scheme; a fraud.
The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
A form of malware that monitors user activities and reports them to an external their party. Spyware can be legitimate in that it is operated by an advertising and marketing agency for the purpose of gathering customer demographics. However, spyware can also be operated by attackers using the data gathering tool to steal an identity or learn enough about a victim to harm them in other ways.
An attack focusing on people rather than technology
Alerts used as a warning of danger.
an attempt by hackers to damage or destroy a computer network or system.
a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and .
the ultimate call control center that gives customers full control of all T-Mobile's scam protection options.
Malware is defined as any device software that aims to cause damage and steal data. Malware is an abbreviation for malicious software. Ransomware and trojan, for example, are types of malware widely used in email attacks
E-mail name based on discusting meat product
Best method to address unwanted links and emails
Software that is designed to interfere with a computerʼs normal functioning and that can be used to commit cybercrime.
A Virus that encrypts your data and you have to pay to receive the encryption key.
E-mail address to report Cyber-Security concerns
(TWO WORDS) What are rapid and regular network patching, internal firewalls, backups secured off-line, and dual factor authentication a part of?
The technique of sneeking in a security door behind someone who is authorized (Name also used to describe what is done before football games in the parking lot).
(TWO WORDS) When someone uses your personal informaton to obtain gain.
Hardware or software used in an attempt to block cyber attacks (word also used in fire prevention).
(TWO WORDS) A program that surfs the web has artificial intelligence to hack networks
New upgrade for KRGC that allows for users to use any Wi-Fi and any safe website as it encrypts user activity and keeps activity behind a cloud.
Meaning of first "O" in acronym OODA
Meaning of second "O" in acronym OODA
Meaning of "D" in acronym OODA
Meaning of "A" in acronym OODA
Malware that replicates rapidly to slow a system down to make it crash
(TWO WORDS) What you should do if you see ANY anomaly
Georgia's lawmaking branch, which is in charge of creating, debating and determining the laws that guide the state.
Georgia’s legislature which is made up of the Georgia Senate and the Georgia House of Representatives.
the process through which a legislative body prepares and enacts laws through its lawmaking process.
the head of the majority party in a legislative body
the head of the minority party in a legislative body
the primary leader of the House of Representatives in the General Assembly
a committee created for a specific, pressing cause
a committee that exists on a permanent basis in charge of reviewing and refining legislative measures that come under the subject area of the committee
money paid by citizens that go to the Georgia state government
funds collected from taxes on income, profit, sales, and property.
A branch in Georgia in which the Governor, Lieutenant Governor, Secretary for State, Attorney General, and State Treasurer are responsible for enforcing and carrying out laws
the elected executive head of a state of Georgia
the executive official of a state who follows the governor in rank and assumes their position in the event of infirmity or death.
a legal officer who represents Georgia in legal proceedings and gives legal advice to the government.
the leading judge in Georgia’s Supreme Court
the body of laws in Georgia regulating ordinary private matters
the highest court in the Judicial Branch in Georgia
a legal system focused with punishing individuals who commit crimes
A branch in Georgia responsible for interpreting laws
a court of appeals that deals with less serious criminal offenses
a court with wide authority over the territory of a specific state
those serving on the Supreme Court of Georgia
a judicial procedure in which a case from a lower court is taken to a higher court for review of a lower court’s
a court that is part of the Georgian judicial system and is responsible for hearing and evaluating legal appeals
A court of appeals reviews appeals from district courts within its circuit on objections to district court rulings.
Relative Sea Level Rise
To leave one homeland to live elsewhere because of economic troubles and settle in another
a minority that speaks a different language or follows different customs than the majority of people in a country
A large open area beneath a ship's deck, often used to house traveling immigrants
A shop or factory where workers work long hours at low wages under unhealthy conditions
to absorb fully; to adopt as one's own; to absorb a group into the culture of a larger population
A building in which several families rent rooms or apartments, often with little sanitation or safety
poor, crowded, and run-down urban neighborhoods
residential areas that sprang up close to or surrounding cities as a result of improvements in transportation
the name associated with America in the late 1800s, referring to the extravagant wealth of a few and the terrible poverty that lay underneath
institutions located in a poor neighbor-hood that provided numerous community services such as medical care, child care, libraries, and classes in English
state educational institutions built with the benefit of federally donated lands
writing which exaggerates sensational, dramatic, and gruesome events to attract readers, named for stories that were popular during the late 1800s; a type of sensational, biased, and often false reporting
A 19th century artistic movement in which writers and painters sought to show life as it is rather than life as it should be
loyalty to a local area
a type of music with a strong rhythm and a lively melody with accented notes, which was popular in early 1900s
stage entertainment made up of various acts, such as dancing, singing, comedy, and magic shows