Try It

Phase One: Cybersecurity Issue - Definition

Match the term to the correct definition

Definitions:

  1. Programs designed to display ads on your computer as a way of collecting info about you
  2. Software that spies on you
  3. Malicious software that cybercriminals program to reproduce that target specific executable files on the computer
  4. Infectious software designed to replicate without targeting any specific files
  5. Malicious programs that misrepresents itself to appear useful
  6. Records every keystroke entry made on a computer to capture sensitive information like usernames, passwords, etc.
  7. A set of malicious software tools that gives an unauthorized user privileged access to a computer
  8. An email, phone call, or text message sent from someone appearing legitimate in order to get personal info
  9. Malicious programs designed to infiltrate a computer and carry out instructions from a central command server
  10. Malware that locks the data on a victim’s computer and a request for money is made to restore normal functioning

Terms:

  • Adware
  • Spyware
  • Computer viruses
  • Worms
  • Trojans
  • Keyloggers
  • Rootkits
  • Phishing and Spear Phishing
  • Bots and Botnets
  • Ransomeware

Answers:

  1. Adware

    Answer: Programs designed to display ads on your computer as a way of collecting info about you

  2. Spyware

    Answer: Software that spies on you

  3. Computer viruses

    Answer: Malicious software that cybercriminals program to reproduce that target specific executable files on the computer

  4. Worms

    Answer: Infectious software designed to replicate without targeting any specific files

  5. Trojans

    Answer: Malicious programs that misrepresents itself to appear useful

  6. Keyloggers

    Answer: Records every keystroke entry made on a computer to capture sensitive information like usernames, passwords, etc.

  7. Rootkits

    Answer: A set of malicious software tools that gives an unauthorized user privileged access to a computer

  8. Phishing and Spear Phishing

    Answer: An email, phone call, or text message sent from someone appearing legitimate in order to get personal info

  9. Bots and Botnets

    Answer: Malicious programs designed to infiltrate a computer and carry out instructions from a central command server

  10. Ransomeware

    Answer: Malware that locks the data on a victim’s computer and a request for money is made to restore normal functioning

Phase 2: Problem - Solution

Match the solution with the problem

Problem:

  1. Computer is running slowly
  2. Ads continuously pop up
  3. Computer gets extremely hot when being used
  4. Computer is glitching and could possible crash
  5. An unknown file appears in your documents folder with .exe extension
  6. Computer seems to be having random operating issues

Solutions:

  • Run a disk cleanup and defragment
  • Install a malware removal software to remove adware
  • Clean the fan by removing dust and other debris
  • Backup files to keep from losing important data
  • Run a virus scan and remove threats
  • Run Windows Update to be sure all software is the most updated version

Answers:

  1. Problem: Computer is running slowly

    Solution: Run a disk cleanup and defragment

  2. Problem: Ads continuously pop up

    Solution: Install a malware removal software to remove adware

  3. Problem: Computer gets extremely hot when being used

    Solution: Clean the fan by removing dust and other debris

  4. Problem: Computer is glitching and could possible crash

    Solution: Backup files to keep from losing important data

  5. Problem: An unknown file appears in your documents folder with .exe extension

    Solution: Run a virus scan and remove threats

  6. Problem: Computer seems to be having random operating issues

    Solution: Run Windows Update to be sure all software is the most updated version