Computer Science : S5: L5 : Cyber Security

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 12

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

13 Terms

1

Viruses

Malware that spreads between computers, causing damage to software and data by gaining access through infected networks, routers, files, and emails.

New cards
2

Spyware

Program that covertly sends information from a computer to another without the user's knowledge, potentially stealing personal data, browsing habits, and more.

New cards
3

Brute Force Attack

Hacker method of systematically trying all password possibilities until the correct one is found, often through trial and error.

New cards
4

Phishing

Breach of sensitive data caused by users clicking on deceptive links or messages, leading to potential identity theft or information compromise.

New cards
5

Data Interception

Unauthorized recording of data before reaching the intended recipient, often for stealing passwords, personal information, or identity theft.

New cards
6

Worms

Malware that self-replicates on a computer, gaining control, stealing data, and causing system overload by exploiting security weaknesses.

New cards
7

Social Engineering

Hacker tactic of psychologically manipulating users to divulge personal information through deception and emotional manipulation.

New cards
8

Pharming

Cyber attack redirecting users to fake websites to steal personal data, often achieved by manipulating DNS settings or poisoning DNS servers.

New cards
9

DDoS Attack

Overwhelming a server with numerous requests from multiple computers to slow down or crash the server, making it unavailable.

New cards
10

Hacking

Unauthorized access to personal or organizational data for malicious purposes, such as causing damage, stealing information, or disrupting activities.

New cards
11

Adware

Malicious software that displays unwanted advertisements and pop-ups after installing itself on a device.

New cards
12

Ransomware

Malware that encrypts files on a device, preventing access until a ransom is paid to decrypt the data.

New cards
13

Trojan Horse

Malware that disguises itself as a legitimate program to download onto a device, allowing attackers remote access to steal data or delete files.

New cards

Explore top notes

note Note
studied byStudied by 8 people
810 days ago
5.0(1)
note Note
studied byStudied by 10 people
739 days ago
5.0(1)
note Note
studied byStudied by 38 people
657 days ago
5.0(1)
note Note
studied byStudied by 8 people
790 days ago
5.0(1)
note Note
studied byStudied by 35 people
828 days ago
5.0(1)
note Note
studied byStudied by 2 people
132 days ago
5.0(1)
note Note
studied byStudied by 6532 people
688 days ago
4.7(29)

Explore top flashcards

flashcards Flashcard (61)
studied byStudied by 26 people
811 days ago
5.0(1)
flashcards Flashcard (55)
studied byStudied by 3 people
120 days ago
5.0(1)
flashcards Flashcard (239)
studied byStudied by 3 people
435 days ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 9 people
81 days ago
5.0(1)
flashcards Flashcard (39)
studied byStudied by 7 people
728 days ago
5.0(2)
flashcards Flashcard (20)
studied byStudied by 233 people
292 days ago
5.0(3)
flashcards Flashcard (145)
studied byStudied by 43 people
418 days ago
5.0(1)
flashcards Flashcard (29)
studied byStudied by 51 people
3 days ago
5.0(2)
robot