1.4 Security Threats

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

What is a virus?

Is a malicious software that spreads through a computer system causing damage to the software.

2
New cards

Name an example of a virus.

Worm and Trojan horse are 2 examples of a virus.

3
New cards

What is Worm Virus?

Can replicate itself and spread from system to system by finding a weakness in the software.

  • It can spread quickly

  • Does not require human interaction to first start spreading

4
New cards

Name 2 qualities of a Worm Virus.

1)Can spread quickly

2) It does not require human interaction to start spreading

5
New cards

What is a Trojan Horse Virus?

Is a harmful program that looks legitimate so users are tricked into installing it .

  • Does not self replicate of infect other files

  • Give attackers access to your entire computer system

6
New cards

Name 2 qualities of a Trojan Horse Virus

1) Does not self replicate or infect other files

2) Give attackers access to entire system

7
New cards

What is malware?

Is a harmful program that seeks damage or unauthorised access to your computer system

8
New cards

Name 3 examples of malware.

Spyware, Keyloggers and Ransomware

9
New cards

What is Spyware?

Secretly records the activities of a user on a computer.

  • Steals passwords, credit cards information and usernames

  • All info is secretly passed to the hacker

10
New cards

Name 2 qualities of Spyware

1) Steals passwords, credit cards information and usernames

2) All info is secretly passed to the hacker

11
New cards

What is a key logger?

Secretly records every keystroke made by a user on a computer .

  • Records passwords , usernames and credit card information.

  • Can be downloaded or plugged into a USB port

12
New cards

Name 2 qualities of a Key logger.

1) Records passwords , usernames and credit card information.

2) Can be downloaded or plugged into a USB port

13
New cards

What is ransomware?

Locks files on a computer system using encryption so a user can no longer access it . Attacks will usually ask for a sum of money to give access back to a computer system.