Rise of the Bots and Cybersecurity Essentials

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/22

flashcard set

Earn XP

Description and Tags

A collection of vocabulary terms covering different types of malware, cyberattacks, hacking categories, and the legal framework of the Computer Misuse Act (1990) as presented in the lecture.

Last updated 9:24 AM on 5/19/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

23 Terms

1
New cards

Malware

Malicious software designed to gain access to a computer with intent to disable hardware, steal data, force advertising, send spam, or extort money.

2
New cards

Botnet

A large collection of malware-infected devices, known as zombies, controlled by an attacker.

3
New cards

Bot herder

An attacker who chooses when to 'wake' the zombies in a botnet to perform an attack.

4
New cards

DDoS (Distributed Denial of Service)

An attack where multiple malware-infected computers make requests to a single server at the same time to overload the system.

5
New cards

DoS (Denial of Service)

A cyberattack in which a criminal makes a network resource unavailable to intended users by flooding the target machine with requests.

6
New cards

Ransomware

A self-replicating form of virus that locks a computer and encrypts files, demanding a ransom be paid to unlock the data.

7
New cards

Internet bots

Automated programs that perform tasks repeatedly, such as indexing for search engines (crawlers), providing customer service (chatbots), or monitoring prices (shopbots).

8
New cards

Adware

A form of worm, virus, or Trojan that infects a computer to download or display malicious adverts or pop-ups.

9
New cards

Spyware

Unwanted software that monitors and gathers information on how a person uses their computer, sometimes for targeted advertising.

10
New cards

Keyloggers

A sinister type of spyware that records every keystroke made by a user to steal sensitive data.

11
New cards

Trojans

Software that appears to perform a useful function, such as a game, but hiddenly performs malicious actions like opening a 'back door' for attackers.

12
New cards

Worms

Malware that replicates itself to spread through a network and use system resources (bandwidth) without needing to attach to files.

13
New cards

Viruses

Malicious self-replicating software that modifies other programs by inserting code; it must be initiated or executed by a user to infect a system.

14
New cards

Hacking

The act of gaining unauthorised access to or control of a computer system.

15
New cards

Penetration testers (pen testers)

People paid to legally hack into systems with the purpose of helping a company identify security weaknesses.

16
New cards

Script kiddies

Hackers who use tools downloaded from the internet to perform attacks with little technical knowledge.

17
New cards

Hacktivists

Individuals motivated by political reasons or social causes who use hacking to create disruption or public embarrassment.

18
New cards

Brute force attack

A form of attack that makes multiple attempts to discover sensitive information, such as a password.

19
New cards

The Computer Misuse Act (1990)

Parliamentary legislation that established three specific offences regarding unauthorised access and interference with computer systems.

20
New cards

Section 1 of the Computer Misuse Act (1990)

Unauthorised access to computer material (data).

21
New cards

Section 2 of the Computer Misuse Act (1990)

Unauthorised access with intent to commit or facilitate the commission of further offences.

22
New cards

Section 3 of the Computer Misuse Act (1990)

Unauthorised acts with intent to impair, or with recklessness as to impairing, the operation of a computer.

23
New cards

Cloudflare.com (2019) Statistic

A report stating that over 50%50\% of all internet traffic is bot traffic, a significant portion of which is malicious.