More cards in this set

Card 6

Front

they spread over computer networks by exploiting operating system vulnerabilities.

Back

Preview of the front of card 6

Card 7

Front

a flaw in a system which causes an undisired outcome.

Back

Preview of the front of card 7

Card 8

Front

designed to remotely access or control a computer.

Back

Preview of the front of card 8

Card 9

Front

type of malware that automatically delivers advertisements.

Back

Preview of the front of card 9

Card 10

Front

Gaining confidential or personal information with a motive.

Back

Preview of the front of card 10

Card 11

Front

It uses email and fraudulent websites that are designed to steal your personal data or information.

Back

Preview of the front of card 11

Card 12

Front

An unauthorized individual follows an authorized individual to enter a secured premise.

Back

Preview of the front of card 12

Card 13

Front

A person who looks over the victims shoulder while they type personal/confidential data.

Back

Preview of the front of card 13