ICT Flashcards
Phishing
sending emails pretending to be from company to gain personal info
Cybercrime
criminal activity carried out using computer or network
email scam
fake email used as primary took to steal money + personal info
trojan horse
malware that appears legitimate but performs malicious activity when run
malware
software designed to cause harm or damage to computer
2 types data
personal and sensitive
Examples of computer crimes
identity theft
cyberbullying
Salami slicing
Unauthorised access
gaining access to systems you have no permission to access
Email scams
phishing
trojan horse
virus generated mail
fraudulent request
things to look for in email scams
greeting
senders address
forged link
request for personal info
sense of urgency
poor spelling and grammar
logic bomb
piece of code tells computer to execute set of instructions at specific time/conditions
ransomware
software illegal installed so user cant access data until paid
computer misuse Act 1990
illegal to look at or modify someone elses files without permission
why might they do it
mischief/challenge
steal money
steal/modify info
political
meta data
data about data