Campbell_DiscComp_17e_PPT_Mod05

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

flashcard set

Earn XP

Description and Tags

Computer Science ATAR revision Y11

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

Digital Security Risk

Any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.

2
New cards

Cybercrime

Online or Internet-based illegal acts, such as distributing malicious software or committing identity theft.

3
New cards

Data Mining

The process of sifting through Big Data to find important questions that yield fruitful results.

4
New cards

Social Engineering

A category of attack that attempts to trick the victim into giving valuable information to the attacker.

5
New cards

Digital Forensics

The discovery, collection, and analysis of evidence found on computers and networks.

6
New cards

Malware

Short for malicious software, it consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices.

7
New cards

Botnet

A group of compromised computers or mobile devices connected to a network that are used to attack other networks.

8
New cards

Denial of Service (DoS) Attack

An attack that overloads a server with network traffic so that it cannot provide necessary services.

9
New cards

Two-Factor Authentication (2FA)

A security process in which the user provides two different authentication factors to verify themselves.

10
New cards

Cloud Computing

The delivery of various services over the internet, including data storage and computing power.

11
New cards

Virus

A type of malware that attaches itself to a legitimate program or file, allowing it to spread from one computer to another.

12
New cards

Worm

A standalone malware that replicates itself to spread to other computers without needing to attach to a program.

13
New cards

Trojan Horse

A type of malware that disguises itself as a legitimate application to trick users into installing it.

14
New cards

Ransomware

Malware that encrypts a victim's files and demands payment for the decryption key.

15
New cards

Spyware

Malware that secretly monitors user activity and collects personal information.

16
New cards

Adware

Software that automatically delivers advertisements, which can sometimes include malware.

17
New cards

Rootkit

A type of malware designed to gain unauthorized access to a computer while hiding its presence.

18
New cards

Phishing

A type of cyber attack where attackers pose as trustworthy entities to steal sensitive information, usually through deceptive emails.

19
New cards

Identity Theft

The deliberate use of someone else's identity, usually for financial gain or fraud.

20
New cards

Data Breach

An incident where unauthorized access to data occurs, leading to exposure of sensitive or confidential information.

21
New cards

Privacy Violation

The unauthorized access or use of personal information, potentially leading to identity theft or other harm.

22
New cards

Software Vulnerabilities

Weaknesses or flaws in software that can be exploited by attackers to gain unauthorized access or cause harm.

23
New cards

Insider Threats

Security risks that originate from within the organization, often involving employees or contractors misusing their access.

24
New cards

Social Media Risks

Potential dangers stemming from personal information shared on social media platforms, including oversharing and cyberbullying.

25
New cards

Unpatched Software

Software that has not been updated to fix vulnerabilities, leaving it susceptible to attacks.