Computer Science paper 1

HideShow resource information
What is malware short?
Malicious software
1 of 16
What type of malware is usually hidden in another program or file?
A virus
2 of 16
What type of malware can replicate itself?
A worm
3 of 16
What type of malware disguises itself as a legitimate piece of software?
Trojan
4 of 16
What type of malware passes information on to a criminal without the users knowledge?
Spyware
5 of 16
What type pf malware displays advertisements and redirects search requests?
Adware
6 of 16
What type of malware limits or denies a users access to their system until they pay a ransom is paid?
Ransomware
7 of 16
What is pharming?
The redirecting of a users website by modifying their Domain name system entries to a fraudulent site
8 of 16
What is social engineering?
Tricking people into giving their personal information or valuables?
9 of 16
What is phishing?
Using emails, text messages and phone calls to impersonate people to get users to divulges personal info
10 of 16
What is shouldering?
Watching over someones shoulder at an ATM and recording their pin
11 of 16
What is blagging?
Carried out face to face and uses believable scenarios to trick people into giving up personal information?
12 of 16
What is a brute force attack?
An attack that repeatedly tries different usernames and passwords in an attempt to access a system
13 of 16
What is a DOS (denial of service) attack?
Trying to flood a website or network with data traffic to bring it to a halt
14 of 16
What is a threat that intercepts and decodes a messages the contains personal information before it reaches its destination?
Data interception and theft
15 of 16
What is SQL injection?
Using the same query language the site uses and uses commands instead of usernames and passwords to steal private information
16 of 16

Other cards in this set

Card 2

Front

A virus

Back

What type of malware is usually hidden in another program or file?

Card 3

Front

A worm

Back

Preview of the back of card 3

Card 4

Front

Trojan

Back

Preview of the back of card 4

Card 5

Front

Spyware

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Common system threats resources »