• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back

Web Threat

Any threat that uses the internet to perform malicious activities

Web Threats includes...

Trojan Horses, Spyware, Adware, Pharming

Cyber Criminals

Steal information for subsequent sale

Social Engineering

The means by which people are manipulated or deceived into performing certain actions

Generic Conversation


Non-English Language


Virus or Patch Alerts


Account Information


Mail Delivery Error


Physical Attraction


Free Downloads


Accusatory


Current Events

Types of Message Content

Spam, Hoax, Phishing, Pharming, Botnet

Forms of Web Threats

Spam

Represents a high volume of threats that exist on the web

Email, Newsgroup, Spim, Mobile/SMS

Forms of Spam

Hoax

It is an attempt to trick people into believing that something false is real.

Phishing

A malicious activity involving social engineering tecniques that would lead usersbto divulge their personal information.

Authentic looking sender


Socially-engineered message


Link to a fraudulent web pahe

Components of Phishing

Pharming

Way of redirecting users ti malicious websites through a technique called DNS cache poisoning.

DNS Cache Poisoning

New strategy in which malicious hackers use DNS server they control to feed erronous information to other DNS servers.

Botnet

Known as Network Zombie Machine under the control of cyber-criminals.