1/29
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Cyber security
Protection of computer systems, networks and data from criminal activity.
Cyber security threats
Potential risks that make systems vulnerable to attacks.
Blagging
Creating an invented scenario to pretend to be someone else to gain information.
Blagging example
Calling IT support pretending to be an employee to get a password.
Worm
A malware which replicates and spreads to other computers by itself.
Pretext
Scenario used in blagging.
Phishing
Sending fake emails/texts to trick users into giving you their personal information.
Phishing e.g
An email claiming you won a prize and asking for bank details.
Shouldering (shoulder surfing)
Watching someone enter private information.
Shouldering e.g
Looking over someone’s shoulder at an ATM to steal their pin.
Malicious code (malware)
Software designed to harm computers/steal data.
Virus
A program that spreads by attaching itself to files.
Virus e.g
Deletes documents or slows down the computer.
Spyware
Software that secretly collects user info without permission.
Spyware e.g
A program that records keystrokes to steal passwords.
Trojan
Malware disguised as a legit program but Performs harmful actions once installed.
Trojan e.g
Downloading a free game that secretly installs a backdoor for hackers.
Removable media
Using external storage devices that can carry malware or sensitive data.
Removable media e.g
Plugging in a USB from an unknown source that contains a virus.
pharming
Redirecting a user from a real website to a fake one to steal data.
Pharming e.g
Typing a correct bank URL but being sent to a fake site that asks for login details.
Weak & default passwords
Passwords that are easy to guess
Weak/default passwords e.g
123456, admin, password
Misconfigured access rights
Giving users access to files or systems they shouldn't have.
Misconfigured access rights e.g
A student being able to edit teacher only files .
Unmatched and outdated software
Using software which hasn't been updated which can have security flaws.
Outdated software e.g
Running an old version of a browser that hackers can exploit .
Ransomware
Malware that prevents you from accessing your computer, usually by encrypting files.
adware
software that opens pop-ups or windows that you can’t close.
Automatic software updates
where software is automatically updated to the latest version to remove software patches.