LO4 summary 1 0.0 / 5 ? ICTData and InformationGCSEAQA Created by: yasmine.critchleyCreated on: 29-11-19 14:37 Type of Malware: Adware Shows banners and pop-ups 1 of 22 Type of Malware: Bot Gains control over your computer 2 of 22 Type of Malware: Bug A mistake or an error in a software 3 of 22 Type of Malware: Ransomware Can block a system until money is paid 4 of 22 Type of Malware: Rootkit Allows access to your computer without being 5 of 22 Type of Malware: Trojan Horse Disguises itself as something else 6 of 22 Type of Malware: Virus Code copies itself to corrupt a system/destroy data 7 of 22 Type of Malware: Worm Worms its way across computers leaving a copy in the memory of each other 8 of 22 Type of Malware: Spyware Collects personal data/monitors browsing activity 9 of 22 Type of Social Engineering: Pretexting An excuse to do something or say something that is not accurate 10 of 22 Type of Social Engineering: Baiting Luring the victim into performing a specific task by providing easy access to something the victim wants 11 of 22 Type of Social Engineering: Phishing A malicious individual or group of individuals who scam users, by sending e-mails or creating web pages to get personal information like passwords 12 of 22 Type of Social Engineering: Quid Pro Quo Fraudsters who impersonate IT service people to get information 13 of 22 Type of Social Engineering: Tailgating An employee opening a door and holding it open for others, visitors without badges, or the passive acceptance of a uniformed worker 14 of 22 Type of Social Engineering: Shoulder Surfing Used to get confidential data by looking over the victim's shoulder like your bank account passwords or your credit card pin number 15 of 22 Type of Social Engineering: Pharming When you are taken from a real website to a fake website 16 of 22 What is White Hat Hacker? They work for an organisation and have no malicious intent and help the company 17 of 22 What is Grey Hat Hacker? They just do it for fun to see what they can do 18 of 22 What is Black Hat Hacker? They hack into a system and have malicious intent to steal information or money 19 of 22 Environmental vulnerabilities: Earthquake, tsunami, lightning strikes, flood, fire 20 of 22 Physical vulnerabilities: Theft 21 of 22 System vulnerabilities: Insecure hardware, weak passwords, outdated software 22 of 22
Comments
No comments have yet been made