Definitions Flashcards

1
Q

Malware

A

a malicious software, such as a virus which is specifically designed to disrupt or damage a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Engineering

A

social engineering refers to tricking people into divulging personal information or other confidential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adware

A

advertising software: shows banners or pop-ups when online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bot

A

web robot: gains control over your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bug

A

a mistake or error in a software program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ransomware

A

can block access to a system until money is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rootkit

A

software tools allows access to your computer without being detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trojan Horse

A

used by hackers it disguises itself as something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus

A

code copies itself to corrupt a system/ destroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worm

A

worms its way across computers leaving a copy in the memory of each one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

collects personal data/ monitors browsing activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pretexting

A

which an individual lies to obtain privileged data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Baiting

A

use a false promise to pique a victim’s greed or curiosity/ they lure users into a trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phising

A

harmful individual, or group of individuals that cheat users by sending emails or creating web pages/ intended to collect online bank details, credit card or other login information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Quid pro quo

A

involves hacker requesting the exchange of critical data or login credentials in exchange for a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tailgating or Piggybacking

A

physical security breach in which an unauthorized person follows an authorized individual to enter a secured promise

17
Q

White hat hackers

A

are usually security experts who are hired by organisations to legitimately try to hack into their system to identify security failings

18
Q

Grey hat hackers

A

are those who hack into a system without malicious intent/ against law and violates ethical standards

19
Q

Black hat hackers

A

create malware to hack into systems

20
Q

Identity theft

A

another personally identifying information

21
Q

Data destruction

A

destroying data stored on hard disks and other forms of electronic data

22
Q

Data manipulation

A

changing of data to make it easier to read or be more organized

23
Q

Data Modification

A

change data

24
Q

Data theft

A

stealing computer based information from an unknowing victim

25
Q

Denial of service to authorised users

A

security event that occurs when an attacker prevents legitimate users to accessing the information

26
Q

Contingency

A

backup/ keep going with enough time

27
Q

Iteration

A

is when you do something over and over again usually to try to improve something

28
Q

Phase review

A

regularly monitor the work that has actually taken place/ update your plan as a result

29
Q

Alphanumeric data

A

a combination of letters and numbers

30
Q

Database

A

an organised/ structured set of data

31
Q

Project life cycle

A

sequence of phases that a project goes through from its initiation to closure

32
Q

Constraints

A

period of time (start/ finish)

33
Q

Legislations

A

the laws in place

34
Q

Feasibility report

A

is a document that accesses potential solutions to the business