Revision 5.3 Threats Flashcards
(7 cards)
What are the 7 threats to computer systems?
:Phishing
:Hacking
:Trojan
:Interception
:Eavesdropping
:Social Engineering
Phishing vs Pharming
Phishing: Misleading individuals or organisations into giving up sensitive information (such as passwords or bank details), often through the use of emails.
Pharming : Pharming is a cyberattack technique used to redirect a website’s traffic to a fake website without the user’s knowledge.
Similarities: Both pharming and phishing tactics aim to exploit unsuspecting individuals and extract sensitive information, such as login credentials or financial data, for nefarious purposes.
Hacking
Exploiting weaknesses in a system or network to create, view, modify or delete files without permission.
Similar to data theft - illegally removing copies of personal or company data from computer
systems.
Trojan
Appears to be a useful or well-known
program but when downloaded
and installed it secretly gives the attacker a ‘backdoor’ to your system. Through this backdoor the attacker can access data without the user knowing.
Interception
Data packets on a network are intercepted by a third party (e.g. hacker) and copied, edited or transferred to a different location than the
intended destination
Eavesdropping
Intercepting, in real-time, private
communication traffic such as instant
messages or video calls.
Social Engineering
Tricking individuals into giving sensitive information,
e.g. by claiming to be from the IT department and asking for their password and username to check for viruses.