5.3 threats Flashcards
what is phishing
misleading individuals or organizations into giving up sensitive information such as passwords often through the use of emails
hacking
exploiting weaknesses in a system or network to create view or modify or delete files without permission
trojan
appears to be a useful or well known program but when downloaded and installed it secretly gives the attacker access data without user knowing
interception
when data packets on a network are intercepted and copied edited or transferred to a different location than the intended destination
eaves dropping
intercepting in real time private communication such as instant messages or video calls
social engineering
tricking individuals into giving sensitive information by claiming to be from their department etc
viruses
a virus can replicate itself from a system by attaching itself to infected files that are then downloaded and opened, once activated virus can modify data or corrupt a system so that it stops working