5.3 Threats Flashcards Preview

ICT A-Level > 5.3 Threats > Flashcards

Flashcards in 5.3 Threats Deck (8)
Loading flashcards...
1

Phishing

Using email to gain info
Pretending to be a company

2

Hacking

gaining unauthorised access to computer systems by breaking their passwords

3

Viruses

Type of malware
designed to do damage and replicated
commonly through emails or downloads

4

Trojan

Type of malware
looks legitimate
gaining access
enables: spying, steal data, access to the system

5

Interception

unauthorised access to data/software
could be a program or computer system
recording communication

E.g. Emails, Watching your screen, intercepting details during transmission.

6

Eavesdropping

real-time intercepting
unauthorised
listening to phone calls, video conference, IM(instant messaging)

7

Social Engineering

manipulating people to give confidential information
human interaction
Victim willingly gives out information because they are tricked to do it.

8

Data theft

Stealing data
Electronically or hard copies