Computer Science : S5: L5 : Cyber Security

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Viruses

1 / 12

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

13 Terms

1

Viruses

Malware that spreads between computers, causing damage to software and data by gaining access through infected networks, routers, files, and emails.

New cards
2

Spyware

Program that covertly sends information from a computer to another without the user's knowledge, potentially stealing personal data, browsing habits, and more.

New cards
3

Brute Force Attack

Hacker method of systematically trying all password possibilities until the correct one is found, often through trial and error.

New cards
4

Phishing

Breach of sensitive data caused by users clicking on deceptive links or messages, leading to potential identity theft or information compromise.

New cards
5

Data Interception

Unauthorized recording of data before reaching the intended recipient, often for stealing passwords, personal information, or identity theft.

New cards
6

Worms

Malware that self-replicates on a computer, gaining control, stealing data, and causing system overload by exploiting security weaknesses.

New cards
7

Social Engineering

Hacker tactic of psychologically manipulating users to divulge personal information through deception and emotional manipulation.

New cards
8

Pharming

Cyber attack redirecting users to fake websites to steal personal data, often achieved by manipulating DNS settings or poisoning DNS servers.

New cards
9

DDoS Attack

Overwhelming a server with numerous requests from multiple computers to slow down or crash the server, making it unavailable.

New cards
10

Hacking

Unauthorized access to personal or organizational data for malicious purposes, such as causing damage, stealing information, or disrupting activities.

New cards
11

Adware

Malicious software that displays unwanted advertisements and pop-ups after installing itself on a device.

New cards
12

Ransomware

Malware that encrypts files on a device, preventing access until a ransom is paid to decrypt the data.

New cards
13

Trojan Horse

Malware that disguises itself as a legitimate program to download onto a device, allowing attackers remote access to steal data or delete files.

New cards

Explore top notes

note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 29 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 37 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 282 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard93 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 9 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard34 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard24 terms
studied byStudied by 35 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard112 terms
studied byStudied by 16 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard118 terms
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard47 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard230 terms
studied byStudied by 90 people
Updated ... ago
5.0 Stars(1)