Internet Threats Flashcards

1
Q

A term used to describe actions taken by someone to gain unauthorized access to a computer. Process by which cyber criminals gain access to computers.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as viruses, worms, trojan, spyware and adware

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A common type of online fraud. A means to point you to a malicious and illegitimate website by directing the legitimate URL.

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Also known as “Spoofing”. Fake emails, text messages and websites created to look like they’re from authentic companies. They’re sent by criminals to steal personal and financial info from you

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two common types of ransomware

A

•Lockscreen ransomware
•Encryption ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Displays an image that prevents you from accessing your computer

A

Lockscreen ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encrypts files on your system’s hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives preventing your computer from opening them

A

Encryption ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The mass distribution of unsolicited messages, advertising or pornography to address which can be easily found on the internet through things like social networking sites, company websites and personal blogs.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Used as third parties to infiltrate your computer. Software that collects personal info about you without you knowing. They often come in the form of a free download and are installed automatically with or without your consent. Difficult to remove and can infect your computer with viruses

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it’s downloaded

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtual “listening in” on info that’s shared over an unsecure wifi network

A

Wi-fi eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unlike a virus, goes to work on its own without attaching itself to files or programs. It lives in your computer memory, doesn’t damage or alter the hard drive and propagates by sending itself to other computer in a network – whether within a company or the internet itself

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly