security threats Flashcards
virus
can replicate itself and spread from system to system
it only activates when opened by human
it changes data or corrupts a system.
worm
doesn’t need to infect a file
trojan
looks like a legitimate software so users are tricked into installing it,
spyware
secretly record the users activity
keylogger
secretly records the key presses (for password)
ransomware
locks files on a computer system using encryption so that users aren’t able to access it until the ransom is payed
SQL injection
when a command is entered into a data input box on a website.
it can trick the website into giving unauthorise access to the attacker
DoS attack
when a server is overloaded with requests that have been sent by the attacker
brute force attack
testing every combination from start to finish to get the password
social engineering
tricking others unto revealing personal data
penetration tests
testing to find risks or weaknesses
anti malware software
used to locate and delete malware, like viruses, on a computer system.
firewall
manages incoming and outgoing network traffic.