Computer Science : S5: L5 : Cyber Security

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

Viruses

Malware that spreads between computers, causing damage to software and data by gaining access through infected networks, routers, files, and emails.

2
New cards

Spyware

Program that covertly sends information from a computer to another without the user's knowledge, potentially stealing personal data, browsing habits, and more.

3
New cards

Brute Force Attack

Hacker method of systematically trying all password possibilities until the correct one is found, often through trial and error.

4
New cards

Phishing

Breach of sensitive data caused by users clicking on deceptive links or messages, leading to potential identity theft or information compromise.

5
New cards

Data Interception

Unauthorized recording of data before reaching the intended recipient, often for stealing passwords, personal information, or identity theft.

6
New cards

Worms

Malware that self-replicates on a computer, gaining control, stealing data, and causing system overload by exploiting security weaknesses.

7
New cards

Social Engineering

Hacker tactic of psychologically manipulating users to divulge personal information through deception and emotional manipulation.

8
New cards

Pharming

Cyber attack redirecting users to fake websites to steal personal data, often achieved by manipulating DNS settings or poisoning DNS servers.

9
New cards

DDoS Attack

Overwhelming a server with numerous requests from multiple computers to slow down or crash the server, making it unavailable.

10
New cards

Hacking

Unauthorized access to personal or organizational data for malicious purposes, such as causing damage, stealing information, or disrupting activities.

11
New cards

Adware

Malicious software that displays unwanted advertisements and pop-ups after installing itself on a device.

12
New cards

Ransomware

Malware that encrypts files on a device, preventing access until a ransom is paid to decrypt the data.

13
New cards

Trojan Horse

Malware that disguises itself as a legitimate program to download onto a device, allowing attackers remote access to steal data or delete files.