1. 1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. 4. a defense technology designed to keep the malicious attacks out.
  3. 6. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  4. 9. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
  5. 11. An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic
  6. 14. A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
  7. 16. all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
  8. 17. Short for “penetration testing,” this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
  1. 2. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  2. 3. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  3. 5. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
  4. 7. internet version of a home address for your computer.
  5. 8. A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
  6. 10. A group of computers, printers and devices that are interconnected and governed as a whole.
  7. 12. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  8. 13. a tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
  9. 15. A piece of malware that can replicate itself in order to spread the infection to other connected computers.