1/4
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is a malicous USB cable
A USB cable that has been modified or designed to carry out harmful activities when connected to a device. These cables can be used to exploit vulnerabilities in a computer or mobile device, allowing unauthorized access, data theft, or installation of malware. It is important to be cautious when using USB cables from unknown or untrusted sources to mitigate the risk of potential attacks.
What is a malicous flash drive
A storage device that is intentionally designed to carry out harmful activities on a computer or network. It may contain malware, viruses, or other malicious software that can compromise the security and integrity of the system it is connected to. These flash drives are often used for unauthorized data access, data theft, or spreading malware to other devices.
What can a malicious flash drive or USB cable do to your computer?
These devices can potentially perform various harmful actions on a computer, such as:
Install malware: It can automatically execute malicious code or install malware onto the computer, compromising its security.
Steal data: It can copy sensitive information from the computer, including personal files, login credentials, or financial data.
Damage files or system: It can corrupt or delete files, modify system settings, or even render the computer inoperable.
Spread infections: It can transfer malware to other connected devices or networks, facilitating the spread of infections.
Exploit vulnerabilities: It can take advantage of software vulnerabilities to gain unauthorized access or control over the computer.
What is skimming
the action of stealing credit card information or payment card data from customers of an online store. The transaction data is intercepted during the online purchase checkout process, without customers noticing anything unusual.
What is card cloning
The unauthorized copying of information from a credit or debit card onto another card. This is typically done by criminals who use specialized devices to extract card data, such as the card number and PIN. The cloned card can then be used to make fraudulent transactions, potentially leading to financial loss for the cardholder. It is important to safeguard personal card information and report any suspicious activity to the card issuer.