1/13
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Viruses
malicious code that attaches to files/programs and spreads
worms
self-replicating programs that spread across networks
Trojan horses
malicious software disguised as legitimate programs
ransomware
encrypts files and demands payment for decryption
spyware
collections information without consent or displays unwanted ads
Hoax
false information deliberatly spread onlinen to deceive, scare or manipulate users
Nigerian scam
a type financial scam where attackers promise a large sum of money or a lucrative opportunity in exchange for a payment or sensitive information
phishing
fake emails or websites designed to steal credentials
spear phishing
targeted attacks at specific individuals or companies
pretexing
trick users into revealing confidential info
baiting
entices users with something appealing to infect devices
botnet
a network of compromised computers, servers or IoT devices controlled by cybercriminal
evil twins
a fake WiFi access point
Click fraud
fraudulent clicking on online ads to generate revenue or drain a competitors ad budget (bots or human click)