computer misuse Flashcards
What are three things to look out for in a typical phishing email?
- Greeting not personalized
- Sender’s address is a variation on a genuine address
- Request for personal information
What does the Computer Misuse Act 1990 make illegal?
It’s illegal to look at or modify someone else’s files without permission
Define hacking
Hacking is illegally accessing or modifying computer files without permission
List some reasons why hackers hack
- Pure mischief or challenge
- To steal money
- To steal or modify information
- For political reasons or revenge
How do hackers typically gain access to systems?
- Exploiting security weaknesses in outdated software
- Using obvious usernames and passwords
- Tricking users into downloading malware
What does malware stand for?
Malicious software
What can malware do?
- Gather personal or sensitive data
- Modify or delete files
What is a logic bomb?
A logic bomb tells the computer to execute instructions at a certain date, time, or under specified conditions
What is ransomware?
Ransomware is software that prevents access to files until a ransom is paid
What significant ransomware attack occurred in 2017?
The NHS and many others were affected by the WannaCry attack
Define a computer virus
A type of malware that replicates and installs itself without consent
How can a computer virus spread?
- Through email
- File sharing
What are common types of malware?
- Browser hijackers
- File infectors
- Macro viruses
Which of the following are signs of malware? A new toolbar appears on your browser.
TRUE
Which of the following are signs of malware? You receive a fraudulent email.
FALSE