Computer Science (Network Security)

?
  • Created by: ZainabYH
  • Created on: 05-07-22 13:04
What is pharming
Pharming is Where scammers try to redirect users to a fake website to get all their personal details without the user even knowing​
1 of 10
What is a virus
It is a program written to change the way a computer operates by attaching itself to an actual document then spreading itself to other networks/computers to steal personal details
2 of 10
What is a worm
Often happens on emails. similar to a virus, but it doesn't need to attach itself and it can self-replicate to many other emails even worldwide within hours.
3 of 10
What is a trojan horse
This works by clicking on a link which actually once clicked, installs malware on your device, which then can take details from you without you knowing it
4 of 10
What is spyware
This is used to monitor the activity of a user by clicking on a link which then gets redirected to a malicious website​
5 of 10
What is adware
It is an advert which cannot be closed once popped up and an get money by the user just clicking on the add.
6 of 10
What is shouldering
Where you look over someone's shoulder why they are entering their pin
7 of 10
What is blagging
It is where you get a person to trust you and slowly get personal details off them
8 of 10
What is phishing
a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illegaly
9 of 10
What is malware
software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
10 of 10

Other cards in this set

Card 2

Front

What is a virus

Back

It is a program written to change the way a computer operates by attaching itself to an actual document then spreading itself to other networks/computers to steal personal details

Card 3

Front

What is a worm

Back

Preview of the front of card 3

Card 4

Front

What is a trojan horse

Back

Preview of the front of card 4

Card 5

Front

What is spyware

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Networks resources »