1.4 Security Threats

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 12

flashcard set

Earn XP

Description and Tags

13 Terms

1

What is a virus?

Is a malicious software that spreads through a computer system causing damage to the software.

New cards
2

Name an example of a virus.

Worm and Trojan horse are 2 examples of a virus.

New cards
3

What is Worm Virus?

Can replicate itself and spread from system to system by finding a weakness in the software.

  • It can spread quickly

  • Does not require human interaction to first start spreading

New cards
4

Name 2 qualities of a Worm Virus.

1)Can spread quickly

2) It does not require human interaction to start spreading

New cards
5

What is a Trojan Horse Virus?

Is a harmful program that looks legitimate so users are tricked into installing it .

  • Does not self replicate of infect other files

  • Give attackers access to your entire computer system

New cards
6

Name 2 qualities of a Trojan Horse Virus

1) Does not self replicate or infect other files

2) Give attackers access to entire system

New cards
7

What is malware?

Is a harmful program that seeks damage or unauthorised access to your computer system

New cards
8

Name 3 examples of malware.

Spyware, Keyloggers and Ransomware

New cards
9

What is Spyware?

Secretly records the activities of a user on a computer.

  • Steals passwords, credit cards information and usernames

  • All info is secretly passed to the hacker

New cards
10

Name 2 qualities of Spyware

1) Steals passwords, credit cards information and usernames

2) All info is secretly passed to the hacker

New cards
11

What is a key logger?

Secretly records every keystroke made by a user on a computer .

  • Records passwords , usernames and credit card information.

  • Can be downloaded or plugged into a USB port

New cards
12

Name 2 qualities of a Key logger.

1) Records passwords , usernames and credit card information.

2) Can be downloaded or plugged into a USB port

New cards
13

What is ransomware?

Locks files on a computer system using encryption so a user can no longer access it . Attacks will usually ask for a sum of money to give access back to a computer system.

New cards
robot