malware 0.0 / 5 ? ICTNetworksGCSEOther Created by: becky hoylandCreated on: 03-07-18 22:03 locks your computer until you send a payment to the hacker. ransomware 1 of 13 collects your personal information and data. spyware 2 of 13 completes automated tasks. bot 3 of 13 computer program that misleads the user of its true intent. trojan horse 4 of 13 excutes itself and spreads by infecting other programs or files. virus 5 of 13 they spread over computer networks by exploiting operating system vulnerabilities. worm 6 of 13 a flaw in a system which causes an undisired outcome. bug 7 of 13 designed to remotely access or control a computer. rootkit 8 of 13 type of malware that automatically delivers advertisements. adware 9 of 13 Gaining confidential or personal information with a motive. social engineering 10 of 13 It uses email and fraudulent websites that are designed to steal your personal data or information. phishing 11 of 13 An unauthorized individual follows an authorized individual to enter a secured premise. tailgating 12 of 13 A person who looks over the victims shoulder while they type personal/confidential data. shoulder surfing 13 of 13
Comments
No comments have yet been made