5.3 Threats Flashcards

1
Q

what is phishing

A

where a person is contacted by someone posing as a legitimate organisation to encourage the divulging of sensitive information e.g. bank details.
This information is then used to access accounts resulting in identity theft or financial loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is interception

A

when an unauthorised party has gained access to a system resulting in illicit copying of programs or data file. wiretapping to obtain data in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is data theft

A

the theft of data from a computer system or data intercepted during transmission across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is eavesdropping

A

unauthorised interception of private communication e.g. phone call or message. it is used to access data e.g. installing network monitoring software onto a computer or a server so that data can be intercepted during the transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is social engineering

A

someone is manipulated into providing confidential information. cyber criminals use this to get information relating to passwords, bank information or install malicious software to provide them with access to the information or take control of the computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is hacking

A

unauthorised intrusion into a computer network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are black hat hackers

A

hackers that hack to take control over the system for personal gain by destroying stealing or preventing authorised users from accessing the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are grey hat hackers

A

hackers that hack into systems and notify organisations of vulnerabilities. hacking with no malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are white hat hackers

A

ethical hackers, only seek vulnerabilities when they are legally permitted to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a virus

A

malicious code that copies itself into another program and changes how the computer system works. caused by someone spreading it through emails or links or inserting removable storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a trojan

A

a trojan hides within what appear as a harmless program or will trick someone into installing it. It collects information on the system and sets up holes in the security or takes over the system and locks out an authorised user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 types of trojan threat

A

trojan banker - steals account data for online banking
trojan IM - steals logins and passwords from instant messaging programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly