software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Malware
1 of 7
Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures
Social engineering
2 of 7
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Spyware
3 of 7
Malware that lock your computer and demands money for its release
Ransomware
4 of 7
Malware that disguises itself as a genuine site
Trojanhorse
5 of 7
Gaining confidential information by looking over someones shoulder
Shouldering
6 of 7
a form of fraud from which someone (the attacker) “masquerades” as a well know (reputable) person or company in an email
Phishing
7 of 7
Other cards in this set
Card 2
Front
Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures
Back
Social engineering
Card 3
Front
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Back
Card 4
Front
Malware that lock your computer and demands money for its release
Comments
No comments have yet been made