Unit 1 - LO5 Understand Ethical and Operational Issues and Threats to Computer Systems Flashcards

5.3 Threats

1
Q

Threats

A
. Phishing
. Hacking
. Virus
. Trojan
. Interception
. Eavesdropping
. Data theft
. Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing

A

Misleading individuals or organisations into paring with their confidential and personal data to commit fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacking

A

Not all hacking is external, as employees also hack their own company systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virus

A

Malicious code that replicates by copying itself to another program, boot sector or document and changes how the computer system works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan

A

Introducing a piece of code which, when certain conditions are met, will carry out an action which will be detrimental to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Interception

A

When the data packets on the internet are intercepted by a third party and copied, edited or transferred to a new location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Eavesdropping

A

Listening to communication traffic not intended for the reader or listener.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data theft

A

Illegally removing copies of personal or company data from information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social engineering

A

The manipulation of individuals to trick them into giving sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly