the act of gaining illegal access to a computer system without the owner's consent
1 of 5
PHARMING
malicious code installed on the hard drive of a user's computer or on the web server. This code will redirect user to a fake website without their consent
2 of 5
PHISHING
creator of sends out a legitimate-looking email in the hope of gathering personal and financial data. It requires the recipient to follow a link in the email or open an attachment
3 of 5
SPYWARE
software that gathers information by monitoring key presses on a user's computer and relays the information back to the person who sent the software
4 of 5
VIRUS
program or code that replicates itself and is designed to amend, delete or copy data and files on a user's computer without their consent
5 of 5
Other cards in this set
Card 2
Front
malicious code installed on the hard drive of a user's computer or on the web server. This code will redirect user to a fake website without their consent
Back
PHARMING
Card 3
Front
creator of sends out a legitimate-looking email in the hope of gathering personal and financial data. It requires the recipient to follow a link in the email or open an attachment
Back
Card 4
Front
software that gathers information by monitoring key presses on a user's computer and relays the information back to the person who sent the software
Back
Card 5
Front
program or code that replicates itself and is designed to amend, delete or copy data and files on a user's computer without their consent
Comments
No comments have yet been made