
Cybersecurity Vocab
Authored by AUSTIN SUTTON
Computers
9th - 12th Grade
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The study of computational thinking, the thinking humans need to in order to describe a step by step process to a computer.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Protocols for encrypting/decrypting information.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Identity theft, stealing money, stealing private information, controlling private computers.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
_____ is a type cyber attack that threatens to publish the victim’s data or block access to it unless an amout is paid.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Protection of computer systems, networks, and data from digital attacks.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The usage of deceptive emails and websites to maliciously gather personal information
Phishing
Identity Theft
Ransomware
Trojan Virus
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The assurance that systems and data are accessible by authorized users when and where needed.
Protocol Entrance
Availability
Accessibility
Confirmed Authorization
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?