Internet Threats Flashcards
A term used to describe actions taken by someone to gain unauthorized access to a computer. Process by which cyber criminals gain access to computers.
Hacking
Is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as viruses, worms, trojan, spyware and adware
Malware
A common type of online fraud. A means to point you to a malicious and illegitimate website by directing the legitimate URL.
Pharming
Also known as “Spoofing”. Fake emails, text messages and websites created to look like they’re from authentic companies. They’re sent by criminals to steal personal and financial info from you
Phishing
a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
Ransomware
Two common types of ransomware
•Lockscreen ransomware
•Encryption ransomware
Displays an image that prevents you from accessing your computer
Lockscreen ransomware
Encrypts files on your system’s hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives preventing your computer from opening them
Encryption ransomware
The mass distribution of unsolicited messages, advertising or pornography to address which can be easily found on the internet through things like social networking sites, company websites and personal blogs.
Spam
Used as third parties to infiltrate your computer. Software that collects personal info about you without you knowing. They often come in the form of a free download and are installed automatically with or without your consent. Difficult to remove and can infect your computer with viruses
Spyware
A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it’s downloaded
Trojan horse
Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download.
Viruses
Virtual “listening in” on info that’s shared over an unsecure wifi network
Wi-fi eavesdropping
Unlike a virus, goes to work on its own without attaching itself to files or programs. It lives in your computer memory, doesn’t damage or alter the hard drive and propagates by sending itself to other computer in a network – whether within a company or the internet itself
Worms