LO4- 4.1 Types of threats- (types of malware and social engineering) Flashcards

1
Q

Types of malware (Rebecca Rabbit)

A
Worms 
Viruses 
Spyware 
Trojan horse 
Bugs 
Bots 
Adware 
Ransom ware 
Rootkit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adware

A

Advertising-supported software. Most adware is more annoying than dangerous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bots

A

Bots take control of a computer system without the user’s acknowledgement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bug

A

They are connected to software and are flaws to produce unwanted outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ransomware

A

Holds a computer system captive and demand a ransom, usually money to release it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rootkit

A

Designed to remotely access or control a computer system without being detected by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spyware

A

Can collect data from an infected computer. Including personal information like user logins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trojan horse

A

Malicious software designed to give full control of an infected PC to another PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus

A

A attempt to make a computer system unreliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worm

A

A computer system that replicates itself so it can spread to other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of social engineering

A
Phishing
Pretexting 
Baiting 
Quid pro quo 
Tailgating/piggybacking 
Shoulder Surfing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing

A

Uses a fake website that looks like a real one to get people to enter their security details and steal them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pretexting

A

When a cyber criminal lies to get data or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shoulder surfing

A

Aims to steal data and information by someone literally looking over your shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly