Module 2.2 Flashcards
Social Engineering
Any attempt to manipulate or ‘con’ someone into
giving out confidential information (password or account number) which can be used to impersonate them, to install malware, etc.
Malware
Any software that is written with negative intentions.
Phishing
It refers to attempts from people to con the user into giving out personal and confidential details such as PIN numbers and passwords, etc. by posing as a legitimate organisation, usually via e‑mail.
Pharming
Scamming practice where user is redirected to another (fake) website even when the user types in a ‘valid’ URL in their browser. The criminal can then use any data the user enters.
Click-Jacking
An attack where a site appears to one thing but your clicks are redirected to do something else.
Spoofing
E‑mail spoofing is the forgery of an e‑mail header so that the e‑mail appears to be from a different origin (or person).
Spyware
Technique or software that tries to monitor and track the way you use your computer and then reports this information to a third party.
Keylogger
Kind of spyware that records your keystrokes as you type (even the movements of your mouse, screenshots of what is displayed on your screen) in an attempt to discover your usernames and passwords.
Computer-Virus
Malware written to disrupt the normal functioning of a person’s computer without their knowledge or consent.
Used to turn your computer into a ‘bot’
to spread malware or
to create security loopholes for other programs to exploit.
Computer Worm
A computer worm is malware that is able to distribute itself over a network, normally via email, without a person having run an infected program
Trojan
Type of malware which is a destructive program disguised as a useful application. Could delete files on your computer, scan your computer
for personal information.
They rely on you to activate them.
Ransomware
Malware that encrypts data (making it unavailable) until you pay a ransom fee.
Adware
Software that downloads onto your computer and bombards your computer with adverts that pop‑up whenever you are connected to the internet.
Bots
A computer that has been compromised (or infected) and can be controlled remotely when it is on and connected to the internet. Also called a ‘zombie’
Cyberstalking
is using the internet to stalk or harass someone