SECURITY KEYWORDS

HACKING
the act of gaining illegal access to a computer system without the owner's consent
1 of 5
PHARMING
malicious code installed on the hard drive of a user's computer or on the web server. This code will redirect user to a fake website without their consent
2 of 5
PHISHING
creator of sends out a legitimate-looking email in the hope of gathering personal and financial data. It requires the recipient to follow a link in the email or open an attachment
3 of 5
SPYWARE
software that gathers information by monitoring key presses on a user's computer and relays the information back to the person who sent the software
4 of 5
VIRUS
program or code that replicates itself and is designed to amend, delete or copy data and files on a user's computer without their consent
5 of 5

Other cards in this set

Card 2

Front

malicious code installed on the hard drive of a user's computer or on the web server. This code will redirect user to a fake website without their consent

Back

PHARMING

Card 3

Front

creator of sends out a legitimate-looking email in the hope of gathering personal and financial data. It requires the recipient to follow a link in the email or open an attachment

Back

Preview of the back of card 3

Card 4

Front

software that gathers information by monitoring key presses on a user's computer and relays the information back to the person who sent the software

Back

Preview of the back of card 4

Card 5

Front

program or code that replicates itself and is designed to amend, delete or copy data and files on a user's computer without their consent

Back

Preview of the back of card 5

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all security resources »