Computer Science : S5: L5 : Cyber Security

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Viruses

1 / 12

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

13 Terms

1

Viruses

Malware that spreads between computers, causing damage to software and data by gaining access through infected networks, routers, files, and emails.

New cards
2

Spyware

Program that covertly sends information from a computer to another without the user's knowledge, potentially stealing personal data, browsing habits, and more.

New cards
3

Brute Force Attack

Hacker method of systematically trying all password possibilities until the correct one is found, often through trial and error.

New cards
4

Phishing

Breach of sensitive data caused by users clicking on deceptive links or messages, leading to potential identity theft or information compromise.

New cards
5

Data Interception

Unauthorized recording of data before reaching the intended recipient, often for stealing passwords, personal information, or identity theft.

New cards
6

Worms

Malware that self-replicates on a computer, gaining control, stealing data, and causing system overload by exploiting security weaknesses.

New cards
7

Social Engineering

Hacker tactic of psychologically manipulating users to divulge personal information through deception and emotional manipulation.

New cards
8

Pharming

Cyber attack redirecting users to fake websites to steal personal data, often achieved by manipulating DNS settings or poisoning DNS servers.

New cards
9

DDoS Attack

Overwhelming a server with numerous requests from multiple computers to slow down or crash the server, making it unavailable.

New cards
10

Hacking

Unauthorized access to personal or organizational data for malicious purposes, such as causing damage, stealing information, or disrupting activities.

New cards
11

Adware

Malicious software that displays unwanted advertisements and pop-ups after installing itself on a device.

New cards
12

Ransomware

Malware that encrypts files on a device, preventing access until a ransom is paid to decrypt the data.

New cards
13

Trojan Horse

Malware that disguises itself as a legitimate program to download onto a device, allowing attackers remote access to steal data or delete files.

New cards

Explore top notes

note Note
studied byStudied by 85 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 22 people
... ago
4.8(4)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 36 people
... ago
5.0(1)
note Note
studied byStudied by 4290 people
... ago
4.5(14)

Explore top flashcards

flashcards Flashcard (237)
studied byStudied by 74 people
... ago
5.0(2)
flashcards Flashcard (44)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (188)
studied byStudied by 51 people
... ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 47 people
... ago
5.0(1)
flashcards Flashcard (85)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (31)
studied byStudied by 15 people
... ago
5.0(2)
flashcards Flashcard (81)
studied byStudied by 52 people
... ago
5.0(5)
flashcards Flashcard (42)
studied byStudied by 5 people
... ago
5.0(1)
robot