1.4.3 Internet attacks - threats to data online Flashcards
Phishing
A legitimate looking email that tricks you into handing over sensitive or personal info by making you go to a bogus website
pharming
similar to phishing but will install malicious code that will re-direct the user to a fake website without their knowledge
Trojan
installs a virus on a user’s computer after they click on a tempting link
Denial of Service (DoS) attacks
attempt to make a website unavailable to legitimate users
hacking
illegal access to a computer or network
black-hat hacker
someone who purposely illegally hacks into a computer or network i order to steal data
white-hat hacker
someone hired by companies so they can test the effectiveness of their security
spyware
software downloaded via the internet that try to steal a user’s information without them knowing. they can do this by monitoring key presses
virus
software that self-replicates and deletes or corrupts files and data on a computer