5.3 Threats Flashcards
Phishing
Using email to gain info
Pretending to be a company
Hacking
gaining unauthorised access to computer systems by breaking their passwords
Viruses
Type of malware
designed to do damage and replicated
commonly through emails or downloads
Trojan
Type of malware
looks legitimate
gaining access
enables: spying, steal data, access to the system
Interception
unauthorised access to data/software
could be a program or computer system
recording communication
E.g. Emails, Watching your screen, intercepting details during transmission.
Eavesdropping
real-time intercepting
unauthorised
listening to phone calls, video conference, IM(instant messaging)
Social Engineering
manipulating people to give confidential information
human interaction
Victim willingly gives out information because they are tricked to do it.
Data theft
Stealing data
Electronically or hard copies