Edit Game
Malware
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public



 Save

Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   13  Close
Presenting someone else's work or ideas as your own
Plagiarism
a type of monitoring software designed to record keystrokes made by a user.
Keylogger
a type of malicious software designed to block access to a computer system until a sum of money is paid
Ransomware
the use of works protected by copyright without permission for a usage where such permission is required
Piracy
A computer program that can copy itself and infect a computer without permission or knowledge of the user.
A virus
a type of malware that downloads onto a computer disguised as a legitimate program
A Trojan Horse
unwanted software designed to throw advertisements up on your screen, most often within a web browser
Adware
a type of social engineering attack in which cyber criminals trick victims into handing over sensitive information or installing malware, usually via emails.
Phishing
a technique used to keep visitors from leaving their website, e. g. by launching an endless series of pop-up ads
Mousetrapping
A type of malware installed on your computer or mobile device without your consent. It can gain access to your sensitive personal information and then relay it to other parties
Spyware
A user wants to complete a transaction in online banking. However, the user is redirected to a fake site that looks like the bank's website.
Pharming
It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
A worm
an attack that tricks a user into clicking a webpage element which is invisible or disguised as another element.
Clickjacking