5.3 Threats Flashcards

1
Q

What is phishing?

A

Where a person is contacted by someone posing as a legitimate organisation to encourage the divulging of sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is black hat hacking

A

Hack to take control over the system for personal gain by destroying, stealing or preventing authorised users from accessing a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is grey hat hacking?

A

Hack into systems and then notify the organisations of the vulnerabilities within their systems, but do not have any malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is white hat hacking?

A

Also known as ethical hackers, only seek vulnerabilities when they are legally permitted to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a virus?

A

Malicious code that replicates by copying itself to another program, boot sector or document and changes how the computer system works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Trojan?

A

A trojan hides within what appears to be a harmless program or will trick a person into installing it. It collects information on the system, sets up holes in the security of the system or may take over the computer system and lock a person out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an interception?

A

When an unauthorised party has gained access to a system, resulting in the illicit copying of programs or data files, or wiretapping to obtain data in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data theft?

A

The theft of data from a computer system or data intercepted during transmission across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is social engineering?

A

This is when someone is manipulated into providing confidential information. Cyber criminals use social engineering to try and get information relating to passwords, bank information or to secretly install malicious software that will provide them with access to the information or to take control of the computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly