LO4 summary 1

?
Type of Malware: Adware
Shows banners and pop-ups
1 of 22
Type of Malware: Bot
Gains control over your computer
2 of 22
Type of Malware: Bug
A mistake or an error in a software
3 of 22
Type of Malware: Ransomware
Can block a system until money is paid
4 of 22
Type of Malware: Rootkit
Allows access to your computer without being
5 of 22
Type of Malware: Trojan Horse
Disguises itself as something else
6 of 22
Type of Malware: Virus
Code copies itself to corrupt a system/destroy data
7 of 22
Type of Malware: Worm
Worms its way across computers leaving a copy in the memory of each other
8 of 22
Type of Malware: Spyware
Collects personal data/monitors browsing activity
9 of 22
Type of Social Engineering: Pretexting
An excuse to do something or say something that is not accurate
10 of 22
Type of Social Engineering: Baiting
Luring the victim into performing a specific task by providing easy access to something the victim wants
11 of 22
Type of Social Engineering: Phishing
A malicious individual or group of individuals who scam users, by sending e-mails or creating web pages to get personal information like passwords
12 of 22
Type of Social Engineering: Quid Pro Quo
Fraudsters who impersonate IT service people to get information
13 of 22
Type of Social Engineering: Tailgating
An employee opening a door and holding it open for others, visitors without badges, or the passive acceptance of a uniformed worker
14 of 22
Type of Social Engineering: Shoulder Surfing
Used to get confidential data by looking over the victim's shoulder like your bank account passwords or your credit card pin number
15 of 22
Type of Social Engineering: Pharming
When you are taken from a real website to a fake website
16 of 22
What is White Hat Hacker?
They work for an organisation and have no malicious intent and help the company
17 of 22
What is Grey Hat Hacker?
They just do it for fun to see what they can do
18 of 22
What is Black Hat Hacker?
They hack into a system and have malicious intent to steal information or money
19 of 22
Environmental vulnerabilities:
Earthquake, tsunami, lightning strikes, flood, fire
20 of 22
Physical vulnerabilities:
Theft
21 of 22
System vulnerabilities:
Insecure hardware, weak passwords, outdated software
22 of 22

Other cards in this set

Card 2

Front

Type of Malware: Bot

Back

Gains control over your computer

Card 3

Front

Type of Malware: Bug

Back

Preview of the front of card 3

Card 4

Front

Type of Malware: Ransomware

Back

Preview of the front of card 4

Card 5

Front

Type of Malware: Rootkit

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Data and Information resources »