6.2 Social Engineering/6.3 Malicious code

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/10

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:03 PM on 4/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

11 Terms

1
New cards

Social engineering

The ability to obtain confidential information by manipulating people

2
New cards

Shoulder surfing

Watching someone enter private or security information and recording/remembering it to gain access

3
New cards

Blagging/Pretexting

Creating an invented scenario to engage a targeted victim. Used to obtain personal information or money by persuading them

4
New cards

Phishing

Sending fake emails or messages appearing to be a valid source to trick a large group into giving personal data

5
New cards

Malware

Computer software with malicious intent

6
New cards

Computer viruses

Infects computers by spreading when executing, attaching to another file. Executed by clicking on infected program

7
New cards

Affect of computer viruses

Deleting, corrupting or modifying files, slowing down performance

8
New cards

Trojan

Malware disguised as a legitimate program but executes another harmful program

9
New cards

Spyware

Installed without the users knowledge and tracks them as they visit websites, gathering information which is then forwarded to a third party

10
New cards

Ransomware

A program that encrypts user’s data to make it unreadable until they pay for the key

11
New cards

Adware

Code embedded or attached to program files which will persistently show adverts