Module 2.2 Flashcards

1
Q

Social Engineering

A

Any attempt to manipulate or ‘con’ someone into
giving out confidential information (password or account number) which can be used to impersonate them, to install malware, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware

A

Any software that is written with negative intentions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

It refers to attempts from people to con the user into giving out personal and confidential details such as PIN numbers and passwords, etc. by posing as a legitimate organisation, usually via e‑mail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pharming

A

Scamming practice where user is redirected to another (fake) website even when the user types in a ‘valid’ URL in their browser. The criminal can then use any data the user enters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Click-Jacking

A

An attack where a site appears to one thing but your clicks are redirected to do something else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spoofing

A

E‑mail spoofing is the forgery of an e‑mail header so that the e‑mail appears to be from a different origin (or person).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spyware

A

Technique or software that tries to monitor and track the way you use your computer and then reports this information to a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Keylogger

A

Kind of spyware that records your keystrokes as you type (even the movements of your mouse, screenshots of what is displayed on your screen) in an attempt to discover your usernames and passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer-Virus

A

Malware written to disrupt the normal functioning of a person’s computer without their knowledge or consent.
Used to turn your computer into a ‘bot’
to spread malware or
to create security loopholes for other programs to exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer Worm

A

A computer worm is malware that is able to distribute itself over a network, normally via email, without a person having run an infected program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trojan

A

Type of malware which is a destructive program disguised as a useful application. Could delete files on your computer, scan your computer
for personal information.
They rely on you to activate them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ransomware

A

Malware that encrypts data (making it unavailable) until you pay a ransom fee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Adware

A

Software that downloads onto your computer and bombards your computer with adverts that pop‑up whenever you are connected to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bots

A

A computer that has been compromised (or infected) and can be controlled remotely when it is on and connected to the internet. Also called a ‘zombie’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cyberstalking

A

is using the internet to stalk or harass someone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spam

A

is a type of harassment that sends you many unwanted and sometimes embarrassing adverts through email

17
Q

Cyberbullying

A

Is when someone is bullied online