Security of Data Flashcards
Hacking
Illegal act of gaining unauthorized access to a computer system
Effect of hacking
-Can lead to identity theft or misuse of data
-Data can be deleted. changed or corrupted on the users computer
Solutions to Hacking
-Use of firewalls
-Use strong passwords and usernames
-Use anti-hacking software
Phishing
A legitimate looking email is sent out, the victim then opens the email. This redirect them to a website which has tricks them into giving out their personal information.
Effect of phishing
-Can lead to identity theft and fraud
-Creator of the phishing attempt gain personal data
Solutions to Phishing
-Many websites or ISP provide email filter, this filters out spam and malicious emails
-Users should always be cautious before opening any attachments
-Users should prevent opening any attachments with end with exe, bat, php
Smishing
it uses the SMS systems to send a fake text message, these scams often contain a URL or a website link for the user to click on. It works the same way as phishing but instead the message is sent through mobile phone.
Vishing
It uses voicemail to trick the user into giving out personal information.
Pharming
The malicious code in embedded into the users computer or website, this will then redirect the user to a fake website without their knowledge.
Effect of pharming
- can personal data
- identity theft and fraud
Solutions to pharming
- certain anti-spyware is able to identify the malicious code and extract it
- the user should be alert for clues that they are being redirected to another website