BIS: Security threats

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Viruses

malicious code that attaches to files/programs and spreads

2
New cards

worms

self-replicating programs that spread across networks

3
New cards

Trojan horses

malicious software disguised as legitimate programs

4
New cards

ransomware

encrypts files and demands payment for decryption

5
New cards

spyware

collections information without consent or displays unwanted ads

6
New cards

Hoax

false information deliberatly spread onlinen to deceive, scare or manipulate users

7
New cards

Nigerian scam

a type financial scam where attackers promise a large sum of money or a lucrative opportunity in exchange for a payment or sensitive information

8
New cards

phishing

fake emails or websites designed to steal credentials

9
New cards

spear phishing

targeted attacks at specific individuals or companies

10
New cards

pretexing

trick users into revealing confidential info

11
New cards

baiting

entices users with something appealing to infect devices

12
New cards

botnet

a network of compromised computers, servers or IoT devices controlled by cybercriminal

13
New cards

evil twins

a fake WiFi access point

14
New cards

Click fraud

fraudulent clicking on online ads to generate revenue or drain a competitors ad budget (bots or human click)