Lesson 3 - Getting started with Tinkercad Flashcards
What Cyber-threats are?
Cyber = anything relating to computers, Virtual reality (VR) & data on the internet
Threat = any malicious attempt to unlawfully damage, steal or disrupt a system
May lead to Cyber attack = computer network, system or website can be damaged or destroyed
5 Types of cyber-threats
General Malware
Virus (subclass Worms)
Phishing
Pharming
Spoofing
General Malware
Trojan Horse
Program disguised as legit software, infiltrates the system to discover financial info or destroy access to a system
Virus
Little bits of code hidden inside another program
When program is launched, virus multiplies in system memory & spreads itself to other computers
Worms
Program that replicates itself - “eating” system files until desk is empty
Phishing
Electronic communication from a fraud, pretending to be from a reputable company, to extract personal information like login details, password, account #, pin codes
Pharming
Redirects a user from a legit website to a fake to steal information like login details, password, account #, pin codes
Spoofing
Someone impersonates a trusted source or person in order to steal data like victims identity or assets or spread malware by coaxing victim to open malware
Strong password typically consists of
at least 8 digits
1 or more capital letter(s)
a symbol
a number
Bio-metric authentication
Employes to confirm the user is indeed the correct person
Biological characteristics eg Fingerprint scanners, Facial or voice recognition
Behavioural characteristics eg
typing or gait recognition
Simulations
A situation in which a particular set of conditions is created artificially, in order to study or experience something that could exist in reality
We design simulations to imitate the effect of an experiment if it was conducted in the real world
Advantages of using simulations
It does not require components to be bought, cost effective
Can be edited freely until best prototype is id, only one prototype built for final testing
Safe place for testing user can not be harmed