1/10
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Social engineering
The ability to obtain confidential information by manipulating people
Shoulder surfing
Watching someone enter private or security information and recording/remembering it to gain access
Blagging/Pretexting
Creating an invented scenario to engage a targeted victim. Used to obtain personal information or money by persuading them
Phishing
Sending fake emails or messages appearing to be a valid source to trick a large group into giving personal data
Malware
Computer software with malicious intent
Computer viruses
Infects computers by spreading when executing, attaching to another file. Executed by clicking on infected program
Affect of computer viruses
Deleting, corrupting or modifying files, slowing down performance
Trojan
Malware disguised as a legitimate program but executes another harmful program
Spyware
Installed without the users knowledge and tracks them as they visit websites, gathering information which is then forwarded to a third party
Ransomware
A program that encrypts user’s data to make it unreadable until they pay for the key
Adware
Code embedded or attached to program files which will persistently show adverts