Cyber Security

?
What is cyber security?
Cyber security are technologies designed to protect networks , and data from the programs and data from attack from damage or unauthorized access.
1 of 10
What is social engineering?
Social engineering, in the context of computer security, refers to tricking people into divulging personal information or other confidential data
2 of 10
Types of social engineering?
Phishing, Pharming , Shoulder surfing ,
3 of 10
Describe phishing?
A phishing email is one that tricks you into handing over sensitive or personal information e.g login details or bank details.
4 of 10
Describe shoulder surfing?
Shoulder Surfing involves direct observation of a user entering their security details.
5 of 10
Describe Pharming?
Pharming is when instead of using a phony link in an email, pharming redirects a website's traffic to a bogus site even if the user has typed the correct web address
6 of 10
What is malware?
Malware is the term used to refer to a variety of hostile or intrusive software.
7 of 10
What is Virus?
What is a Virus?A virus is one type of malware which is installed without your knowledge with the purpose of doing harm.
8 of 10
What is Trojan horse?
A Trojan Horse tricks users into accepting it. Once installed it may open a 'back door' into your computer system through which your personal information can be harvested
9 of 10
What is a worm?
A worm is a standalone program that doesn't need to attach itself to an existing program in order to spread.
10 of 10

Other cards in this set

Card 2

Front

What is social engineering?

Back

Social engineering, in the context of computer security, refers to tricking people into divulging personal information or other confidential data

Card 3

Front

Types of social engineering?

Back

Preview of the front of card 3

Card 4

Front

Describe phishing?

Back

Preview of the front of card 4

Card 5

Front

Describe shoulder surfing?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Cyber Security resources »