A program that performs some specific task that either has some mobility (that is, can move to other computers) or can communicate with other bots and agents to obtain the information necessary to solve the task at hand
The exclusive right tof a work's creator to use,modify,sell, and copy that work as he or she chooses. No one else may use another's work without permission.
A criminal hacker who uses his or her computer skills to gain access to computer systems without permission and / or tampers with programs and data, often causing damage or destruction
The use of the Internet or private networks to break state or federal laws
Someone who uses electronic communications such as email to harm, threaten, or harass a person, group, or organization.
Converting data into a form that cannot be interpreted without decrypting it.
A law that allows use of copyrighted material, so long as it is without profit and for educational or other approved uses.
Someone who enjoys examining computer programs to see how they work, often seeking undocumented features or weaknesses in security.
Crime in which someone obtains personal information such as social security #'s or DL #'s about another person and uses that information to buy goods and services or commit other crimes
Destructive or malicious software programs such as computer viruses, worms, and trojan horses; software tools used to commit cybercrimes.
A common means of authentication in which a person must enter an account name and private word or phrase.
illegally redirecting a websire's traffic to a bogus website.
Using the internet to trick people into giving personal or sensitive data
The use of someone else's words, ideas, or images without their permission and without source citation
Unwanted email that's usually trying to sell or promote something
Sorftware installed on a user's computer without that person's knowledge; it can be used to monitor computer activity, direct users to websites theey do not mean to visit, and even install other softwaare.
any software program in which advertising banners are displayed while the program is running.
designed to detect and destroy computer viruses.
an attempt by hackers to damage or destroy a computer network or system.
a method, often secret, of bypassing normal authentication in a product
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
are small files that Web sites put on your computer hard disk drive when you first visit
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
someone who seeks and exploits weaknesses in a computer system or computer network.
global system of interconnected computer networks that use the Internet protocol suite
a local or restricted communications network, especially a private network created using World Wide Web software.
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
the activity of defrauding an online account holder of financial information by posing as a legitimate company.
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
any malicious computer program which is used to hack into a computer by misleading users of its true intent
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
a standalone malware computer program that replicates itself in order to spread to other computers.
A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data.
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
The combination of typeface and other qualities, such as size, pitch, and spacing.
A word or group of words that act as a way to cross reference to other documents or files on the computer.
A device that feeds data into a computer, such as a keyboard or mouse.
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape.
Usually comprises the display device, circuitry, casing, and power supply.
Sending an email, posting photos on a social media site and using your webcam.
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways.
Usually consists of eight bits.
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials.
copy (data) from one computer system to another, typically over the Internet.
The collection of physical parts of a computer system.
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
A measure of the amount of computational work that a computer system performs.
What do you call a program that is sent to harm your computer
What is it called to break into another computer system
What software can we use to protect out computer ---- virus?
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number?
In stead of using a photo of yourself, you should create an...?
an email message sent to a large number of people without their consent, usually promoting a product or service
what is a computer program sent to gather information from your computer called?
What is a network security system used to stop unauthorised access called?
what should you use to protect your user area?
A password should included numbers, uppercase letters, symbols and ......... letters?
what is it called if people are nasty to you online?
Dont open ...... from people you dont know
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service.
A program that can do things without the user of the computer having to give it instructions.
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer.
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops.
a program that secretly monitors your actions.
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites.
when copying information or images off the internet you must check for what legal information?
you need to check that the information you get off the web is R.......
Small circuit board that controls processing within a computer
Physical parts of a computer
A program that contains instructions for a computer
Applications are also known as
Consists of information
Refers to the method used to enter or transmit your message to a computer
Information or data retrieved or received from a computer
"Brain of the computer"
Input/Output device that reads data from and writes data to a disK
Output device that displays text and graphics on a screen
Input device used for commands and navigation
Input device with an arrangement of letters, etc.
First line of defense
An unauthorized user able to access and misuse information
A destructive program loaded onto a computer
Defamation by written or printed words or pictures
Defamation by oral utterance
A program that allows users to view web pages and online information
Sotware that has been written to detect, isolate, and destroy viruses
A web address
Any word, phrase, or picure that, when clicked, take the user to another location
Playing video and sound in real time
Retrieving somehting fromt he internet and storing it on a disk drive
Using material antoher person has created and claims it as your own
controlled by or connected to another computer or network
working surface of a desk
legal right given to an originator to print, publish, perform, film, or record the originator's work.
any message passed through digital devices.
where computer networkers where users can communicate.
regularly updated website or web page, typically one run by an individual or small group
capable of copying itself and destroying data.
electronic communication used to bully a person or a group of people.
applications that enable users to create and share content or to participate in social networking.
set of rules you should follow in order to make the internet better for others, and better for you.
acquisition and use of a person's private identifying information
A hostile, strongly worded message that may contain obscene language.
specific features or software that parents manage the online activities of children
any device used to communicate provocative messages and/or sexual images
A program, or set of instructions, that runs on a computer.
A software that is designed and destroy computer viruses
Do not leave your laptop or computer ___________________
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
Email scam or attempt to trick you into giving your password or personal information
The state of being free from danger and threat
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus.
Choose a password that is easy for you _______________ but hard for you someone to guess.
Also known as malicious software any; any program or file that is harmful to a computer user
Passwords should should always be at least this many characters long.
A _______ assessment is the process by which risks are identified and the impact of those risks determined
Applied to data to protect it from unauthorized use in case of theft or loss.
Always _______your computer when you leave your desk
To protect personal information, avoid sending it via
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user
A collection of information that is organized so that it can easily be accessed, managed and updated
Never share your _________ with another person
electronic devices and media platforms such as computers, cell phones, video, the Internet, and video games that allow users to create, communicate, and interact with one another or with the device or application itself
a figure of speech in which a comparison is made between two different things using the word like or as
navigating the digital world safely, responsibly, and ethically
a representation of someone or something, such as a photograph or drawing; the way someone or something is perceived by others
a rule that is unfairly applied to different people or groups of people
a set of principles and morals governing people’s behavior, including honesty and respect toward others
a set of principles and morals governing people’s behavior as it relates to the Internet and digital devices
to depict yourself to others as being a certain way or having particular characteristics
an image and personality that you show to others
a graphic image that represents a person online
without a name or other information that identifies who you are
the effect of something that happened earlier
all of the information about a person that can be found online
to let in or to be given entrance
someone seeking entrance to a school or placement in a job, usually competing with others for the position
the general impression of a person held by others and the public
to continue and endure
different factors that surround a piece of information that help determine its meaning
a person or company other than you and the owner of the website you visit
choices a website might give you about what it does with your information
when companies collect information about you based on your online behavior
when companies tailor content to you based on the information they have collected about you
common categories of the population, such as age, gender, and race
data files that are stored on your computer when you visit certain sites, often used by companies to identify repeat customers and personalize visitors’ experiences
knowledge collected from many people towards a common goal
a website created by a group that allows all users in a group to add or edit content
the ability to use a small amount of someone’s creative work without permission, but only in certain ways
a use in connection with a business, usually for profit
a law that protects a creator’s ownership of and control over the work he or she creates, requiring other people to get the creator’s permission before they copy, share, or perform that work
creative work that’s not protected by copyright and is therefore free for one to use however one wants
an idea –whether a phrase, expression, image, or video – that gains widespread recognition online viral: the rapid spread of information, particularly
the view or outlook of someone, based on their thoughts, feelings, experiences, and background
a person who is the object of an intentional action
a person who intentionally commits acts to hurt or damage someone
a person who passively stands by and observes without getting involved
a person who supports and stands up for someone else
to increase or make more intense
to decrease or make less intense
What stops people from illegally distributing and copying material?
what software is designed to disrupt, damage, or gain authorised access to a computer system?
what program is designed to breach the security of a computer system?
what can be downloaded accidentally onto a computer whilst you have e.g. illegally downloaded a film?
When a hacker steals personal information e.g. bank passwords and uses it to steal money from you
when someone sends emails posing as a company asking for personal information
messages from crooks trying to steal your money or your identity
a piece of software that processes incoming emails so as to prevent spam from reaching a user's inbox.
the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
when someone or a robot gets into your device and steals personal information like pictures and bank details
obvious, unauthorized, malicious modification or destruction of data such as information on Web sites.
Protection for your computer
Sending a fake email to steal other people's information
Being harrassed or threatened online
Being pursued by someone online through social media
Software protecting computers from danger
Software programs designed to corrupt computers
Trying to break into computer systems
Something you need from your parents before purchasing something
The use of technologies to protect computers and data from strangers
A common internet breach, stealing information for themselves
Someone who has knowledge in programming and computers
Someone who intentionally and illegally hacks into another person’s system to obtain information
Something you shouldn't give online
A basic security mechanism that consists of a secret word or phrase that must be used to gain access to an account
An attempt by hackers to damage or destroy a computer network or system.
Someone who seeks and exploits weaknesses in a computer system or computer network.
The process of confirming the correctness of the claimed identity
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
The body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
A standalone malware computer program that replicates itself in order to spread to other computers.
Are small files that Web sites put on your computer hard disk drive when you first visit
A technology that allows us to access our files through the internet from anywhere in the world.
Appears at the beginning of the web-link of a secured website
Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
A data classification mode that describes certain data or document as a secret
A government agency in Qatar that handles all reported incidents related to cyber attacks
The art of manipulating people to get access to sensitive information
A software that is a type of utility used for scanning and removing harmful software from your computer
Any software program in which advertising banners are displayed while the program is running
The use of electronic communication to bully a person
A phone call tactic in which individuals are tricked into revealing critical financial or personal information
A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
Similar to worms and Trojans but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cyber criminals) who are often safely located somewhere far across the Internet.