Unit 1 - LO5 Understand Ethical and Operational Issues and Threats to Computer Systems Flashcards
5.3 Threats
Threats
. Phishing . Hacking . Virus . Trojan . Interception . Eavesdropping . Data theft . Social engineering
Phishing
Misleading individuals or organisations into paring with their confidential and personal data to commit fraud.
Hacking
Not all hacking is external, as employees also hack their own company systems.
Virus
Malicious code that replicates by copying itself to another program, boot sector or document and changes how the computer system works
Trojan
Introducing a piece of code which, when certain conditions are met, will carry out an action which will be detrimental to the system.
Interception
When the data packets on the internet are intercepted by a third party and copied, edited or transferred to a new location.
Eavesdropping
Listening to communication traffic not intended for the reader or listener.
Data theft
Illegally removing copies of personal or company data from information systems.
Social engineering
The manipulation of individuals to trick them into giving sensitive information.