Threats Flashcards
Phishing
Misleading individuals or organisations into giving sensitive information e.g. passwords or bank details. Often through the use of emails.
Hacking
Exploiting weaknesses in a system or network to create, view, modify or delete files. without permission.
Data theft
Illegally removing copies of personal or company data from computer systems
Trojan
Appears to be a useful well-known program, but when downloaded and installed it gives the attacker access to your system and data without the user knowing
Data interception
Data packets on a network are intercepted by a third party and copied, edited or transferred to a different location than the intended destination
Eavesdropping
Intercepting private communication traffic such as instant message in real time
Social engineering
Tricking individuals into giving away sensitive information
Virus
It can replicate itself and spread from system to system by attaching itself to infected files that are downloaded and opened. A virus can modify data or corrupt a system so it stops working