Unit 3.8B Data Theft

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/3

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

4 Terms

1
New cards

Describe phishing

Phishing is the method of misleading individuals or organisations into sharing sensitive information (such as passwords or bank details), often through the use of emails.

Phishers may pose as a trusted company like Amazon or YouTube to direct users to open malicious attachments or encourage them to follow fraudulent links to steal their data.

2
New cards

Describe social engineering

Social engineering means to trick others into revealing their personal data by posing as a trusted source.

For example, impersonating an IT

technician of a school via email and asking for a student's username and password.

3
New cards

Describe interception

This is when data packets on a network are intercepted by a third party (e.g. a hacker) and copied to a different location than the intended destination.

Social engineering means to trick others into revealing their personal data by posing as a trusted source.

4
New cards

Describe physical theft

Computer systems (e.g.laptops) or storage devices (e.g. USB stick) may be stolen in public or from offices.