Frage | Antworten |
Shouldering | a method used to find information by direct observation such as watching someone enter their password or pin |
Phishing | A claim to be from a bank or building society in order to find out your financial details |
Blagging | Can be done face to face, by telephone or by computer to try and get information by creating a fake scenario e.g. pretending to be a police officer |
Malware | Malicious software used to disrupt the functioning of the computer or gain access to the computer. |
Pharming | Changes the address of the website you want to visit on your computer to direct you to a bogus site. |
Virus | Code / Software that can replicate itself and is intended to corrupt or delete data. |
Worm | A type of malware which replicates itself and is transffered to other devices causing programs to run slowly. can be used to cause damage or provide access to the computer to hackers. |
Trojan Horse | A type of malware which is installed because the user thinks they are installing a legitimate program. |
Spyware | Malware which sends information to the criminal from your computer. usually comes packages with other software. |
Adware | Malware which redirects you to other sites, redirects search requests to advertising websites. |
Brute force attack | Trial and error method of obtaining user names and passwords. usually using automated software. |
Denial of service attack | DOS attacks grind the network to a halt by flooding it with requests and overloading it with data. |
Data Interception | Packets of data are intercepted using 'packet sniffers' as they are sent along the network to intercept details. |
SQL Injection | SQL commands used to bypass usernames and passwords in a website or system that uses a data base. |
Zero day attack | A vulnerabilty in the security of a website / system. Zero day is known as the day the hole is found. |
Möchten Sie mit GoConqr kostenlos Ihre eigenen Karteikarten erstellen? Mehr erfahren.