5.3 threats Flashcards

1
Q

what is phishing

A

misleading individuals or organizations into giving up sensitive information such as passwords often through the use of emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

hacking

A

exploiting weaknesses in a system or network to create view or modify or delete files without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

trojan

A

appears to be a useful or well known program but when downloaded and installed it secretly gives the attacker access data without user knowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

interception

A

when data packets on a network are intercepted and copied edited or transferred to a different location than the intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

eaves dropping

A

intercepting in real time private communication such as instant messages or video calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

social engineering

A

tricking individuals into giving sensitive information by claiming to be from their department etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

viruses

A

a virus can replicate itself from a system by attaching itself to infected files that are then downloaded and opened, once activated virus can modify data or corrupt a system so that it stops working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly