GCSE ICT 4.1 5.0 / 5 based on 1 rating ? ICTAllGCSEAll boards Created by: MoreamixCreated on: 08-05-19 08:52 Used by hackers, it disguises itself as something else. Trojan Horse 1 of 10 Worms its way across computers leaving a copy in the memory of each one. Worm 2 of 10 Collects personal data / monitors browsing activity. Spyware 3 of 10 Advertising software: shows banners or pop-ups when online Adware 4 of 10 Web Robot: gains control over your computer. Bot 5 of 10 A mistake or error in a software program. Bug 6 of 10 Can block access to a system until money is paid Ransomware 7 of 10 Software tools allows access to your computer without being detected. Rootkit 8 of 10 Code copies itself to corrupt a system/destroy data. Virus 9 of 10 Covers Crimes such as Hacking. It also Covers fraud and deliberate spread of viruses. Could get unlimited fine and upto 5 years in prison. Computer Misuse Act (1990) 10 of 10
Comments
Report