cyberspace network security and data transfer Flashcards
hacking
gaining unauthorised access to a computer with the intention of corrupting or stealing data
pornography
often used as means of hiding malware disguised as adult content
cyber stalking
individuals using technology to harass others for example sending inapropiate email
data theft
theft of personal data which are then used to commit identity fraud
denial of service
a malicous attack on a network for example preventing users from logging on to access their data or email accounts
digital forgery
intentionally and falsely altering digital content for example
spamming
sending junk emails for example adverts for products
virus
a virus can store itself automatically ona computer and can be activated when a certain program is opened
trojan horse
gains entry to a users computer in disguise once installed some trojans can do serious damage for example deleting files
worm
spreads around a computer system by replicating itself
key logger
a program that is designed to record keyboard activities performed by users the main purpose is to steal personal information
spyware
software that is secretly installed on a users computer from the internet tracks user activities gathering useful information for example a credit card