Abbeyfield malware 5.0 / 5 based on 1 rating ? ComputingHardwareGCSEAQA Created by: UHE1Created on: 12-06-19 13:01 2345186 Across 1. Used to identify weaknesses in a system. Tasks can include identifying possible target areas, looking for possible entry points, attempting to break in and seeing how much damage different user levels could cause. (11, 7) 5. A program that is designed to cause some form of harm to a computer or network. (7) 6. Captures, stores and analyses data about the network. The information can identify normal patterns and trends. When something occurs that does not fit the normal, it can hopefully be identified and stopped before it causes damage. (7, 9) Down 1. What is it called when there are vulnerabilities due to poor planning, poorly written code, lack of staff training or lack of staff guidelines or insufficient security measures? (3) 2. Emails that pretend as if they are from a legitimate source but are actually from fraudsters. The aim is to steal money, log in details or identities. (8) 3. A piece of malware that attaches itself to a program or file. Cannot affect a computer unless the infected file is executed. Damage caused could be anything from annoying to deleting system files. (5) 4. Attempting to gain unauthorised access by testing combinations of different passwords. Could use a dictionary of commonly used passwords or try every possible key combination. (5, 5) 8. A piece of malware that pretends to be a legitimate bit of software but once installed does something different. What they do could vary from making annoying changes, deleting files to opening a backdoor to allow malicious users access. (6)
Comments
Report