CS

?
software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.
Malware
1 of 9
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Phishing
2 of 9
something has been done that was not intended by the person
Human error
3 of 9
a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Virus
4 of 9
software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online
Adware
5 of 9
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Spyware
6 of 9
replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
Worm
7 of 9
any malicious computer program which is used to hack into a computer by misleading users of its true intent.
Trojan
8 of 9
malware for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key
Ransomware
9 of 9

Other cards in this set

Card 2

Front

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Back

Phishing

Card 3

Front

something has been done that was not intended by the person

Back

Preview of the front of card 3

Card 4

Front

a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

Back

Preview of the front of card 4

Card 5

Front

software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Software resources »