ICT revision

?
  • Created by: Rjarman
  • Created on: 29-06-18 11:43
software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Malware
1 of 7
Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures
Social engineering
2 of 7
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Spyware
3 of 7
Malware that lock your computer and demands money for its release
Ransomware
4 of 7
Malware that disguises itself as a genuine site
Trojanhorse
5 of 7
Gaining confidential information by looking over someones shoulder
Shouldering
6 of 7
a form of fraud from which someone (the attacker) “masquerades” as a well know (reputable) person or company in an email
Phishing
7 of 7

Other cards in this set

Card 2

Front

Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures

Back

Social engineering

Card 3

Front

software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

Back

Preview of the front of card 3

Card 4

Front

Malware that lock your computer and demands money for its release

Back

Preview of the front of card 4

Card 5

Front

Malware that disguises itself as a genuine site

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all network threats resources »