5.3 Threats Flashcards
What is phishing?
Where a person is contacted by someone posing as a legitimate organisation to encourage the divulging of sensitive information
What is black hat hacking
Hack to take control over the system for personal gain by destroying, stealing or preventing authorised users from accessing a system.
What is grey hat hacking?
Hack into systems and then notify the organisations of the vulnerabilities within their systems, but do not have any malicious intent.
What is white hat hacking?
Also known as ethical hackers, only seek vulnerabilities when they are legally permitted to do so.
What is a virus?
Malicious code that replicates by copying itself to another program, boot sector or document and changes how the computer system works
What is a Trojan?
A trojan hides within what appears to be a harmless program or will trick a person into installing it. It collects information on the system, sets up holes in the security of the system or may take over the computer system and lock a person out.
What is an interception?
When an unauthorised party has gained access to a system, resulting in the illicit copying of programs or data files, or wiretapping to obtain data in a network
What is data theft?
The theft of data from a computer system or data intercepted during transmission across a network.
What is social engineering?
This is when someone is manipulated into providing confidential information. Cyber criminals use social engineering to try and get information relating to passwords, bank information or to secretly install malicious software that will provide them with access to the information or to take control of the computer system.