2.1- Threats to Cyber Security Flashcards

1
Q

What is vishing?

A

making phone calls or leaving voice messages pretending to be from companies in order to trick people to reveal personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is phishing?

A

social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses or ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a DoS attack?

A

A denial-of-service attack is an attack which aims to render a computer or other device unavailable to its users by interrupting the device’s normal functioning. attacks typically function by overwhelming a targeted machine with requests until normal traffic is unable to be processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Trojans?

A

Trojan horse is a type of malware created to look like a legitimate software. It attaches itself to genuine files that are downloaded from the internet. Once the Trojans find its place, it extract users’ information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Botnet?

A

A network system infected with malicious software allowing control without the owner’s knowledge or content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is spyware?

A

Spyware is malicious software that gathers info from a device it tracks various forms of data such as passwords or personal details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Social Engineering?

A

When someone is manipulated into providing confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Pharming?

A

Online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Keylogging?

A

Records keystrokes to capture sensitive data such as passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is hacking?

A

Act of exploiting weakness in a computer or system to steal data or gain unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is man in the middle?

A

a man-in-the-middle attack, or on-path attack, is a cyberattack where the attacker secretly relays between two parties who believe that they are directly communicating with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly