malware

?
locks your computer until you send a payment to the hacker.
ransomware
1 of 13
collects your personal information and data.
spyware
2 of 13
completes automated tasks.
bot
3 of 13
computer program that misleads the user of its true intent.
trojan horse
4 of 13
excutes itself and spreads by infecting other programs or files.
virus
5 of 13
they spread over computer networks by exploiting operating system vulnerabilities.
worm
6 of 13
a flaw in a system which causes an undisired outcome.
bug
7 of 13
designed to remotely access or control a computer.
rootkit
8 of 13
type of malware that automatically delivers advertisements.
adware
9 of 13
Gaining confidential or personal information with a motive.
social engineering
10 of 13
It uses email and fraudulent websites that are designed to steal your personal data or information.
phishing
11 of 13
An unauthorized individual follows an authorized individual to enter a secured premise.
tailgating
12 of 13
A person who looks over the victims shoulder while they type personal/confidential data.
shoulder surfing
13 of 13

Other cards in this set

Card 2

Front

collects your personal information and data.

Back

spyware

Card 3

Front

completes automated tasks.

Back

Preview of the front of card 3

Card 4

Front

computer program that misleads the user of its true intent.

Back

Preview of the front of card 4

Card 5

Front

excutes itself and spreads by infecting other programs or files.

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Networks resources »