1.4 Security Threats

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/12

flashcard set

Earn XP

Last updated 10:17 PM on 2/11/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

13 Terms

1
New cards

What is a virus?

Is a malicious software that spreads through a computer system causing damage to the software.

2
New cards

Name an example of a virus.

Worm and Trojan horse are 2 examples of a virus.

3
New cards

What is Worm Virus?

Can replicate itself and spread from system to system by finding a weakness in the software.

  • It can spread quickly

  • Does not require human interaction to first start spreading

4
New cards

Name 2 qualities of a Worm Virus.

1)Can spread quickly

2) It does not require human interaction to start spreading

5
New cards

What is a Trojan Horse Virus?

Is a harmful program that looks legitimate so users are tricked into installing it .

  • Does not self replicate of infect other files

  • Give attackers access to your entire computer system

6
New cards

Name 2 qualities of a Trojan Horse Virus

1) Does not self replicate or infect other files

2) Give attackers access to entire system

7
New cards

What is malware?

Is a harmful program that seeks damage or unauthorised access to your computer system

8
New cards

Name 3 examples of malware.

Spyware, Keyloggers and Ransomware

9
New cards

What is Spyware?

Secretly records the activities of a user on a computer.

  • Steals passwords, credit cards information and usernames

  • All info is secretly passed to the hacker

10
New cards

Name 2 qualities of Spyware

1) Steals passwords, credit cards information and usernames

2) All info is secretly passed to the hacker

11
New cards

What is a key logger?

Secretly records every keystroke made by a user on a computer .

  • Records passwords , usernames and credit card information.

  • Can be downloaded or plugged into a USB port

12
New cards

Name 2 qualities of a Key logger.

1) Records passwords , usernames and credit card information.

2) Can be downloaded or plugged into a USB port

13
New cards

What is ransomware?

Locks files on a computer system using encryption so a user can no longer access it . Attacks will usually ask for a sum of money to give access back to a computer system.

Explore top notes

note
Japanese Animals Vocab
Updated 126d ago
0.0(0)
note
Food tests
Updated 1284d ago
0.0(0)
note
Plot storyboard
Updated 142d ago
0.0(0)
note
5.1 The Enlightenment
Updated 290d ago
0.0(0)
note
Temperature Effects
Updated 1314d ago
0.0(0)
note
Introduction
Updated 1147d ago
0.0(0)
note
Japanese Animals Vocab
Updated 126d ago
0.0(0)
note
Food tests
Updated 1284d ago
0.0(0)
note
Plot storyboard
Updated 142d ago
0.0(0)
note
5.1 The Enlightenment
Updated 290d ago
0.0(0)
note
Temperature Effects
Updated 1314d ago
0.0(0)
note
Introduction
Updated 1147d ago
0.0(0)

Explore top flashcards

flashcards
Chemistry of Life
59
Updated 878d ago
0.0(0)
flashcards
APUSH Final
22
Updated 1154d ago
0.0(0)
flashcards
architectures part 1
28
Updated 362d ago
0.0(0)
flashcards
pwpt 3
31
Updated 1087d ago
0.0(0)
flashcards
Phys. Ed Exam Notes (Grade 9)
44
Updated 429d ago
0.0(0)
flashcards
Chemistry of Life
59
Updated 878d ago
0.0(0)
flashcards
APUSH Final
22
Updated 1154d ago
0.0(0)
flashcards
architectures part 1
28
Updated 362d ago
0.0(0)
flashcards
pwpt 3
31
Updated 1087d ago
0.0(0)
flashcards
Phys. Ed Exam Notes (Grade 9)
44
Updated 429d ago
0.0(0)