software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.
Malware
1 of 9
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Phishing
2 of 9
something has been done that was not intended by the person
Human error
3 of 9
a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Virus
4 of 9
software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online
Adware
5 of 9
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Spyware
6 of 9
replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
Worm
7 of 9
any malicious computer program which is used to hack into a computer by misleading users of its true intent.
Trojan
8 of 9
malware for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key
Ransomware
9 of 9
Other cards in this set
Card 2
Front
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Back
Phishing
Card 3
Front
something has been done that was not intended by the person
Back
Card 4
Front
a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Back
Card 5
Front
software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online
Comments
No comments have yet been made