unit 6 - cybersecurity

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:53 PM on 1/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

30 Terms

1
New cards

Cyber security

Protection of computer systems, networks and data from criminal activity.

2
New cards

Cyber security threats

Potential risks that make systems vulnerable to attacks.

3
New cards

Blagging

Creating an invented scenario to pretend to be someone else to gain information.

4
New cards

Blagging example

Calling IT support pretending to be an employee to get a password.

5
New cards

Worm

A malware which replicates and spreads to other computers by itself.

6
New cards

Pretext

Scenario used in blagging.

7
New cards

Phishing

Sending fake emails/texts to trick users into giving you their personal information.

8
New cards

Phishing e.g

An email claiming you won a prize and asking for bank details.

9
New cards

Shouldering (shoulder surfing)

Watching someone enter private information.

10
New cards

Shouldering e.g

Looking over someone’s shoulder at an ATM to steal their pin.

11
New cards

Malicious code (malware)

Software designed to harm computers/steal data.

12
New cards

Virus

A program that spreads by attaching itself to files.

13
New cards

Virus e.g

Deletes documents or slows down the computer.

14
New cards

Spyware

Software that secretly collects user info without permission.

15
New cards

Spyware e.g

A program that records keystrokes to steal passwords.

16
New cards

Trojan

Malware disguised as a legit program but Performs harmful actions once installed.

17
New cards

Trojan e.g

Downloading a free game that secretly installs a backdoor for hackers.

18
New cards

Removable media

Using external storage devices that can carry malware or sensitive data.

19
New cards

Removable media e.g

Plugging in a USB from an unknown source that contains a virus.

20
New cards

pharming

Redirecting a user from a real website to a fake one to steal data.

21
New cards

Pharming e.g

Typing a correct bank URL but being sent to a fake site that asks for login details.

22
New cards

Weak & default passwords

Passwords that are easy to guess

23
New cards

Weak/default passwords e.g

123456, admin, password

24
New cards

Misconfigured access rights

Giving users access to files or systems they shouldn't have.

25
New cards

Misconfigured access rights e.g

A student being able to edit teacher only files .

26
New cards

Unmatched and outdated software

Using software which hasn't been updated which can have security flaws.

27
New cards

Outdated software e.g

Running an old version of a browser that hackers can exploit .

28
New cards

Ransomware

Malware that prevents you from accessing your computer, usually by encrypting files.

29
New cards

adware

software that opens pop-ups or windows that you can’t close.

30
New cards

Automatic software updates

where software is automatically updated to the latest version to remove software patches.