Definitions Flashcards

(34 cards)

1
Q

Malware

A

a malicious software, such as a virus which is specifically designed to disrupt or damage a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Engineering

A

social engineering refers to tricking people into divulging personal information or other confidential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adware

A

advertising software: shows banners or pop-ups when online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bot

A

web robot: gains control over your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bug

A

a mistake or error in a software program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ransomware

A

can block access to a system until money is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rootkit

A

software tools allows access to your computer without being detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trojan Horse

A

used by hackers it disguises itself as something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus

A

code copies itself to corrupt a system/ destroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worm

A

worms its way across computers leaving a copy in the memory of each one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

collects personal data/ monitors browsing activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pretexting

A

which an individual lies to obtain privileged data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Baiting

A

use a false promise to pique a victim’s greed or curiosity/ they lure users into a trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phising

A

harmful individual, or group of individuals that cheat users by sending emails or creating web pages/ intended to collect online bank details, credit card or other login information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Quid pro quo

A

involves hacker requesting the exchange of critical data or login credentials in exchange for a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tailgating or Piggybacking

A

physical security breach in which an unauthorized person follows an authorized individual to enter a secured promise

17
Q

White hat hackers

A

are usually security experts who are hired by organisations to legitimately try to hack into their system to identify security failings

18
Q

Grey hat hackers

A

are those who hack into a system without malicious intent/ against law and violates ethical standards

19
Q

Black hat hackers

A

create malware to hack into systems

20
Q

Identity theft

A

another personally identifying information

21
Q

Data destruction

A

destroying data stored on hard disks and other forms of electronic data

22
Q

Data manipulation

A

changing of data to make it easier to read or be more organized

23
Q

Data Modification

24
Q

Data theft

A

stealing computer based information from an unknowing victim

25
Denial of service to authorised users
security event that occurs when an attacker prevents legitimate users to accessing the information
26
Contingency
backup/ keep going with enough time
27
Iteration
is when you do something over and over again usually to try to improve something
28
Phase review
regularly monitor the work that has actually taken place/ update your plan as a result
29
Alphanumeric data
a combination of letters and numbers
30
Database
an organised/ structured set of data
31
Project life cycle
sequence of phases that a project goes through from its initiation to closure
32
Constraints
period of time (start/ finish)
33
Legislations
the laws in place
34
Feasibility report
is a document that accesses potential solutions to the business