This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

CSC-161 Final Computer Security

Reviews computer security terms

AlliBauchspiess
Created Date 08.02.24
Last Updated 08.02.24
Viewed 1 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit
0

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • the process of verifying the identity of a computer user
  • An attack that attempts to trick a person into providing personal information
  • A phishing attack focused on executive-level employees to attain confidential company information
  • This aspect of a password is more important than complexity
  • This virus is also known as the “love letter virus” and the “love bug worm”
  • Measures taken to protect against the criminal or unauthorized use of electronic data
  • A type of malicious software designed to block access to a computer or software until money is paid
  • Don't use personal info, real words, or phrases
  • Requires multiple types of authentication before giving a user access to sensitive info
  • A secure software program that creates and stores secure passwords by encryption
  • A targeted attack that sends emails from a trusted sender
  • Phishing through text messages
  • Phishing using social media
  • An internet service that creates and encrypted connection between a device and a remote server
  • Manipulating telephone systems in an attempt to hack data
  • A test using a self-replicating program that could spread to other computers
  • One of the first computer worms; overwrote program instructions, causing a system to restart
  • An alert used by the US military to alert US citizens
  • Hackers that use their skills to benefit society
  • Hackers that break the law and go into systems without permission

User comments are currently unavailable. We apologize for the inconvenience and are working to restore this feature as soon as possible.