Social Enginnering 0.0 / 5 ? ICTSocial EngineeringGCSEOther Created by: amel1ab0ndCreated on: 07-11-18 10:22 Social Enginnering The use of deception to manipulate individuals into giving over confidential or personal information that may be used for fraud 1 of 18 Piggybacking when a person tags along with another person who is authorized to gain entry into a restricted area. 2 of 18 Tailgating an unauthorized person who follows someone to a restricted area without the consent of the authorized person. 3 of 18 Adware Advertising software: shows banners or pop-ups when online 4 of 18 Bot Web robot that gains control over your computer 5 of 18 Bug A mistake or error in a software program 6 of 18 Ransomware Blocks all access to a system until money is paid 7 of 18 Rootkit Software tools allows access to your computer without being detected 8 of 18 Trojan Horse any malicious computer program which misleads users of its true content 9 of 18 Virus Code copies itself to corrupt a system or to destroy data 10 of 18 Worm Finds its way across computers leaving a copy in the memory of each other 11 of 18 Spyware Collects personal data/ monitors browsing activity 12 of 18 Blagging the act of creating and using an fake scenario to engage a targeted victim 13 of 18 Pharming a scam in which malicious code is installed which redirects the user to a fake website 14 of 18 Phishing an individual or group of individuals who scam users by sending fake emails or websites 15 of 18 Shouldering is used to obtain information such as pins, passwords and other confidential data by looking over the victim's shoulder 16 of 18 Hacking an attempt to exploit a computer system or a private network inside a computer 17 of 18 Scamming an individual, group, or company that attempts to obtain money or something else of value 18 of 18
Comments
No comments have yet been made