Hacking Module CS Revision

What is Phishing?
When criminals send links that take you to fake websites and ask you for login details or bank details etc
1 of 17
How To Identify Phishing E-mails?
Sometimes the E-mail that you receive is sent by a fake email address, you can look out for unusual e-mail addresses, any spelling mistakes and also any weird links that they have told you to go on.
2 of 17
Who Mainly Falls For Phishing E-mails?
Obviously everyone receives them but the people who fall for them are the ones who are less experienced with technology and the internet. These are people like the elderly and young children using the internet unsupervised.
3 of 17
What Are Some Examples Of Human Error?
Some examples are blagging and shouldering
4 of 17
What Is Blagging?
Blagging is when people ask you generic questions such as "When were you born?" to gain information about you so that they can have more of an educated guess of your password
5 of 17
What Is Shouldering?
Shouldering is when someone is discreetly looking over your shoulder as you are typing confidential information to see what you are typing to gain knowledge of your passwords, bank details, PINs etc
6 of 17
How Do You Prevent Blagging?
Try avoiding giving away too much information to others asking many questions
7 of 17
How Do You Prevent Shouldering?
Try to shield your keyboard or the cashpoint so that anyone near you cannot see what you're typing and gain any knowledge
8 of 17
What Does Malware Short For?
Malicious Software
9 of 17
What Is Malware?
Malware is something that is used to gather information from the users without their knowledge, disrupt the functioning of a computer system and gain unauthorised access to a computer system.
10 of 17
What Are Some Examples Of Malware?
There are many examples of malware, these include things like, Pharming, virus, worm, trojan (or trojan horse), spyware and adware.
11 of 17
What Is Pharming?
Making a web address direct you to a fake website instead of the real one even if you type the correct web address. They do this by changing the rules of how traffic flows for that portion of the Internet.
12 of 17
What Is A Virus?
Something that changes the way a computer works and spreads easily from computer to computer like a flu virus does.
13 of 17
What Is A Worm?
Program that spreads across the internet by replicating itself on computers via their internet connections.
14 of 17
What Is A Trojan (Or Trojan Horse)?
A type of virus that secretly enters your computer appearing as something else and as soon as its in, it ruins your computer, like the story of the trojan horse.
15 of 17
What Is Spyware?
Something installed so that you can see what other users on the same computer are doing
16 of 17
What Is Adware?
A form of malware which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "unclosable window".
17 of 17

Other cards in this set

Card 2

Front

How To Identify Phishing E-mails?

Back

Sometimes the E-mail that you receive is sent by a fake email address, you can look out for unusual e-mail addresses, any spelling mistakes and also any weird links that they have told you to go on.

Card 3

Front

Who Mainly Falls For Phishing E-mails?

Back

Preview of the front of card 3

Card 4

Front

What Are Some Examples Of Human Error?

Back

Preview of the front of card 4

Card 5

Front

What Is Blagging?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Phishing, Human Error, Malware resources »