cybersecurity who?? Flashcards
What are the common forms of cyberattacks?
Common forms include phishing , social engineering attacks, malware , and denial-of-service attacks.
What is a Trojan horse?
A Trojan horse disguises itself as legitimate software to trick users into installing it. Once installed, it can perform malicious activities like stealing data or creating backdoors for attackers.
What is spyware?
Spyware is software that secretly monitors and collects information about a user’s activities on their device, often without their knowledge or consent.
How does ransomware work?
Ransomware encrypts a victim’s files or locks their system, then demands a ransom to restore access. Paying the ransom doesn’t guarantee file recovery.
How can you detect malware on your system?
Use antivirus or anti-malware software to scan your system regularly, monitor for unusual system behaviour, and keep an eye on your network traffic.
what’s a keyloggers function
To Record a user’s keystrokes to capture sensitive information like passwords and credit card numbers.
what’s a trojan (malware)
Disguised as legitimate software, they trick users into installing them, then perform malicious actions like stealing data or creating backdoors
what is a DDos attack
Overwhelm a system’s resources by flooding it with traffic, causing it to slow down or crash