1.5.3 (security)

?
  • Created by: Nabeel
  • Created on: 08-12-21 20:02
what is phishing?
where a person is contacted by someone posing as a legitimate organisation and tricking you into giving important information. e.g. personal information.
1 of 7
what is trojan?
when a software pretends to be something harmless but carries out malicious activities in the background.
2 of 7
what is interception?
when an unauthorised party has gained access to a system, resulting in illicit copying of programs or data files, or wiretapping to obtain data in a network.
3 of 7
what is eavesdropping?
the unauthorised real-time interception of a private communication, e.g. a phone call, instant message or video conference. used to access data on a computer or server so that data can be intercepted during transmission.
4 of 7
what is data theft?
the theft of data from a computer system or data intercepted during transmission across a network.
5 of 7
what is social engineering?
this is when someone is manipulated into providing confidential information. cyber criminals will use social engineering to try and get information relating to passwords, bank information or to secretly install malicious software that will provide them wi
6 of 7
what is a virus?
A malicious code that replicates by copying itself to another program, boot sector or document and changes how the computer system works.
7 of 7

Other cards in this set

Card 2

Front

what is trojan?

Back

when a software pretends to be something harmless but carries out malicious activities in the background.

Card 3

Front

what is interception?

Back

Preview of the front of card 3

Card 4

Front

what is eavesdropping?

Back

Preview of the front of card 4

Card 5

Front

what is data theft?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all security resources »