5.3 Threats Flashcards

1
Q

Phishing

A

Using email to gain info

Pretending to be a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hacking

A

gaining unauthorised access to computer systems by breaking their passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Viruses

A

Type of malware
designed to do damage and replicated
commonly through emails or downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan

A

Type of malware
looks legitimate
gaining access
enables: spying, steal data, access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Interception

A

unauthorised access to data/software
could be a program or computer system
recording communication

E.g. Emails, Watching your screen, intercepting details during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Eavesdropping

A

real-time intercepting
unauthorised
listening to phone calls, video conference, IM(instant messaging)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social Engineering

A

manipulating people to give confidential information
human interaction
Victim willingly gives out information because they are tricked to do it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data theft

A

Stealing data

Electronically or hard copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly