Cyber Security
Measures taken to protect computer systems and data from unauthorised access or attacks.
Malware
Malicious software designed to harm or exploit systems.
1/13
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cyber Security
Measures taken to protect computer systems and data from unauthorised access or attacks.
Malware
Malicious software designed to harm or exploit systems.
Virus
A type of malware that attaches to files and spreads when those files are shared.
Worm
Malware that replicates itself and spreads through networks without needing a host file.
Trojan Horse
A program that appears harmless but contains malicious code.
Spyware
Malware that secretly gathers user information without permission.
Ransomware
Malware that locks or encrypts data and demands payment to unlock it.
Phishing
Fraudulent attempts to gain sensitive information by pretending to be a trustworthy source.
Pharming
Redirecting users to fake websites to steal information.
Social Engineering
Manipulating people into revealing personal or confidential information.
Hacker
Someone who gains unauthorised access to systems.
White Hat Hacker
Ethical hacker who helps organisations improve security.
Black Hat Hacker
Malicious hacker who exploits systems for personal or financial gain.
Grey Hat Hacker
A hacker who breaks into systems without permission but doesn't have malicious intent.