Internet Threaths

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

Virus

replicate itself and transfer from one computer to another either internet and local networks or data storage

2
New cards

Worm

- transfers from on a computer to another by any type of means. Often uses a computer network to spread itself.

3
New cards

Trojan

it disguised as a useful program but once downloaded or installed, leaves your PC or gadget unprotected and allows hackers to

4
New cards

Rogue security software

tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality they are not protected at all.

5
New cards

Spyware

a program that runs in the background without you knowing it and has the ability to monitor what you are currently doing and typing through keylogging.

6
New cards

Keyloggers

used the keystroke done by the users. This can steal their password or any other sensitive information.

7
New cards

Adware

it designed to send you advertisements, mostly as pop ups.

8
New cards

SPAM 

unwanted emails mostly form bots or advertisers, It can be used to send malware.

9
New cards

PHISHING

the goal is to acquire sensitive personal information like passwords and credit cards details.