5.3 threats Flashcards

1
Q

what is phishing?

A

Where a person is contacted by someone posing as a legitimate organisation to encourage the divulging of sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is black hat hacking?

A

illegal hacking with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is grey hat hacking?

A

illegal hacking without malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is white hat hacking?

A

legal hacking without malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a virus?

A

Malicious code that replicates by copying itself to another program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a Trojan?

A

A trojan hides within what appears to be a harmless program or will trick a person into installing it. It collects information on the system, sets up holes in the security of the system or may take over the computer system and lock a person out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is an interception?

A

When an unauthorised party has gained access to a system, resulting in the illicit copying of programs or data files, or wiretapping to obtain data in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is data theft?

A

The theft of data from a computer system or data intercepted during transmission across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is social engineering?

A

This is when someone is manipulated into providing confidential information. Cyber criminals use social engineering to try and get information relating to passwords, bank information or to secretly install malicious software that will provide them with access to the information or to take control of the computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly