2.1 Types of Cyber Security Threats Flashcards
What is vishing?
the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers
What is phishing?
Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
What is a DoS attack?
A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device’s normal functioning. DoS attacks typically function by overwhelming or flooding a targeted machine with requests until normal traffic is unable to be processed, resulting in denial-of-service to addition users.
What are Trojans?
Trojan horse is a type of malware created by hackers to look more like a legitimate software. It attaches itself to genuine files that are downloaded from the internet. Trojan horses find their way to the victims’ system through some social engineering tricks to load and run the trojans on the victim’s system. Once the Trojans find its place, it empowers the hackers to extract users’ information without their knowledge and creates a backdoor for them to gain granular access to the system.
What is Botnet?
A network system infected with malicious software allowing control without the owner’s knowledge or content
What is Spyware?
Spyware is malicious software that gathers info from a device without the user’s knowledge, it tracks various forms of data such as passwords or personal details.
What is Social Engineering?
When someone is manipulated into providing confidential information
What is Pharming?
Online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data
What is Keylogging?
Records keystrokes to capture sensitive data such as passwords.
What is hacking?
Act of exploiting weakness in a computer or system to steal data or gain unauthorised access
What is man in the middle?
a man-in-the-middle attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two user parties.