keylogging, phishing, malware

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

Keylogging

A method of capturing and recording user keystrokes, providing a means to obtain passwords or encryption keys.

2
New cards

Benefits of Keylogging

-parents can monitor kids
-employers can monitor employees
-passwords can be saved
-can be used for research

3
New cards

Negatives of Keylogging

steal sensitive information from the victims, such as credit card numbers, passwords, personal emails, banking credentials, driver's license numbers, and so forth.

4
New cards

Hardware Key logging

small chip/wire that is attached to computer; can be easily removed (when removed, the keylogging stops), preferred key logging for employers, wireless ones can exist

5
New cards

Software Keylogging

-harder to detect
-usually secret
-can record screens

6
New cards

Prevent Hardware Keylogging

-Check USB area of laptop in public areas
-use deceptive typing, so that even when you are typing in your password, if anyone is tracking it, they wont get your information

7
New cards

Prevent Software Keylogging

install antivirus, be cautious for phishing attacks, be careful of online money transactions, keep software updated

8
New cards

Get rid of Software Keylogging

Install an anti-keylogger program or format and reinstall your operating system completely.

9
New cards

Phishing

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

10
New cards

Spear Phishing

Attack is targetted at you, typically more difficult to spot

11
New cards

Effects of Spear Phishing

financial drain, cyber attack, lost info

12
New cards

Signs of Spear Phishing

Urgency, Authority, mimicry (of types of emails you usually get), curiosity,

13
New cards

Steps to prevent/deal with phishing

1) Think before you click, verify credibility, check with colleague, do not panic