Campbell_DiscComp_17e_PPT_Mod05

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Digital Security Risk

1 / 24

flashcard set

Earn XP

Description and Tags

Computer Science ATAR revision Y11

25 Terms

1

Digital Security Risk

Any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.

New cards
2

Cybercrime

Online or Internet-based illegal acts, such as distributing malicious software or committing identity theft.

New cards
3

Data Mining

The process of sifting through Big Data to find important questions that yield fruitful results.

New cards
4

Social Engineering

A category of attack that attempts to trick the victim into giving valuable information to the attacker.

New cards
5

Digital Forensics

The discovery, collection, and analysis of evidence found on computers and networks.

New cards
6

Malware

Short for malicious software, it consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices.

New cards
7

Botnet

A group of compromised computers or mobile devices connected to a network that are used to attack other networks.

New cards
8

Denial of Service (DoS) Attack

An attack that overloads a server with network traffic so that it cannot provide necessary services.

New cards
9

Two-Factor Authentication (2FA)

A security process in which the user provides two different authentication factors to verify themselves.

New cards
10

Cloud Computing

The delivery of various services over the internet, including data storage and computing power.

New cards
11

Virus

A type of malware that attaches itself to a legitimate program or file, allowing it to spread from one computer to another.

New cards
12

Worm

A standalone malware that replicates itself to spread to other computers without needing to attach to a program.

New cards
13

Trojan Horse

A type of malware that disguises itself as a legitimate application to trick users into installing it.

New cards
14

Ransomware

Malware that encrypts a victim's files and demands payment for the decryption key.

New cards
15

Spyware

Malware that secretly monitors user activity and collects personal information.

New cards
16

Adware

Software that automatically delivers advertisements, which can sometimes include malware.

New cards
17

Rootkit

A type of malware designed to gain unauthorized access to a computer while hiding its presence.

New cards
18

Phishing

A type of cyber attack where attackers pose as trustworthy entities to steal sensitive information, usually through deceptive emails.

New cards
19

Identity Theft

The deliberate use of someone else's identity, usually for financial gain or fraud.

New cards
20

Data Breach

An incident where unauthorized access to data occurs, leading to exposure of sensitive or confidential information.

New cards
21

Privacy Violation

The unauthorized access or use of personal information, potentially leading to identity theft or other harm.

New cards
22

Software Vulnerabilities

Weaknesses or flaws in software that can be exploited by attackers to gain unauthorized access or cause harm.

New cards
23

Insider Threats

Security risks that originate from within the organization, often involving employees or contractors misusing their access.

New cards
24

Social Media Risks

Potential dangers stemming from personal information shared on social media platforms, including oversharing and cyberbullying.

New cards
25

Unpatched Software

Software that has not been updated to fix vulnerabilities, leaving it susceptible to attacks.

New cards

Explore top notes

note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 43 people
... ago
5.0(2)
note Note
studied byStudied by 24 people
... ago
5.0(1)
note Note
studied byStudied by 63 people
... ago
4.9(7)
note Note
studied byStudied by 16 people
... ago
5.0(2)
note Note
studied byStudied by 20791 people
... ago
4.7(21)

Explore top flashcards

flashcards Flashcard (149)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (53)
studied byStudied by 58 people
... ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (101)
studied byStudied by 17 people
... ago
5.0(2)
flashcards Flashcard (23)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 13 people
... ago
5.0(1)
robot