vocabulary vocabulary O R D 13 W S Write captions under each picture. adware phishing encryption ransomware antivirus firewall 1. ............................................................................................. 2. ............................................................................................. 3. ........................................................................................... 4. ............................................................................................. 5. ............................................................................................. 6. ............................................................................................ 14 O R D W S Match each term to the correct definition. 2. Worm a. A cyberattack that overwhelms the system by flooding it with thousands or millions of superfluous requests. 3. DDoS b. An intermediary server between the user and the Internet. 4. Host-based firewall c. A type of encryption that uses one single key both to encrypt and decrypt data. 1. Crimeware 5. Packet filtering 6. Proxy 7. Unencrypted text 8. Asymmetric encryption 9. Symmetric encryption 10. Encryption key d. Malware that can spread across systems without any action from the user. e. A string of characters that encrypts data. f. Software used to commit illegal online activities, such as stealing identities, money or personal information. g. A type of encryption that uses different keys to encrypt and decrypt data. h. A technique used by firewall that examines the data packets travelling to and from the system. i. A human readable text. j. Software that usually protects individual devices. 224 TelecoMMUNicaTioNs aND NeTWorKs Elettronica-Informatica.indb 224 25/01/24 16:09