Security Threats

?
  • Created by: Howzat
  • Created on: 26-02-18 08:58
Malware
Deliberate intention of harming equipment and data
1 of 21
Worm
Standalone malware that duplicates itself to spread across a network. Often ransomware is used to use the attack to demand money from vulnerable businesses for example.
2 of 21
Virus
A piece of code which is capable of copying itself and could corrupt systems for example.
3 of 21
Trojan
A type of virus that hides itself in a computer to make it look harmless.
4 of 21
Hacking
The process of breaking into a computer system
5 of 21
Spear Phishing
Sending emails to a trusted email/business in order to gain their personal information by making it look real.
6 of 21
Whale Phishing
Sending emails to someone with a high status in order to gain their valuable personal information/details. Email is made to look realistic.
7 of 21
Ransomware
Type of software used to block a users access to a PC and demand money to allow them access again.
8 of 21
Social Engineering
The act of persuading vulnerable individuals into performing actions and providing personal information. Scammers.
9 of 21
Bot
Software that performs automatic actions over the internet.
10 of 21
SQL Injection
Where malicious code is hidden within an application (database).
11 of 21
Pharming
Websites that are made to look real, but are only there to get passwords, bank details etc.
12 of 21
Rootkit
Tools that allow an unauthorised user to gain access and control of a computer system without being detected.
13 of 21
Brute Force
Trail and Error attempts and gaining access to someones account
14 of 21
Anti-Virus Software
Prevent, detect + remove any type of malicious software
15 of 21
Firewall
Protect networks by preventing unauthorized access from getting into the network.
16 of 21
Access Levels
System admins set up user permissions to make sure users can access the required files and information
17 of 21
Password
Secret word that allows a user onto a computer network
18 of 21
Bio metric lock
Using your fingerprint to detect if the correct person is allowed to access the system.
19 of 21
Quarantine
Isolates suspected malicious software on a system. Function of an anti-virus software.
20 of 21
Anti-virus scanning
Function of anti-virus software which checks for malicious files/software and therefore will attempt to remove it.
21 of 21

Other cards in this set

Card 2

Front

Standalone malware that duplicates itself to spread across a network. Often ransomware is used to use the attack to demand money from vulnerable businesses for example.

Back

Worm

Card 3

Front

A piece of code which is capable of copying itself and could corrupt systems for example.

Back

Preview of the back of card 3

Card 4

Front

A type of virus that hides itself in a computer to make it look harmless.

Back

Preview of the back of card 4

Card 5

Front

The process of breaking into a computer system

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Security Threats Keywords resources »