Computer Management (p 55-62) Flashcards
How is human error a threat to data?
When people enter invalid information into a computer, the computer will get invalid information in return (GIGO)
How can we restrict access to data and how will this protect the data?
Restrict access to data by setting up passwords and different types of accounts like admins and standard users. This will prevent attackers from stealing data or limiting other people’s influence on the data.
Explain the following malware:
- Virus
- Worm
- Trojan
- Rootkit
Virus:
Software that gets loaded onto a computer unitentially and performs malicious actions
Worm:
Malware that replicates spreads between computers on network
Trojan:
Malware disguised as useful software. Once active attackers have access to your data
Rootkit:
Grants the attacker with remote access to your computer
Explain the following social engineering methods:
- Spoofing
- Phishing
- Pharming
Spoofing:
Attacker sends email and pretends its from a trusted person asking a favour
Phishing:
Attacker sends a an official looking email requesting sensitive info
Pharming:
Attackers create an official looking website that requests sensitive info