• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/9

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

9 Cards in this Set

  • Front
  • Back
Computer Viruses

Computer Viruses

- A computer program which can duplicate itself


- Can infect files which are shared with other computers, this spreads viruses.


- Can cause the computer to not function properly


- Can generate spam emails


- Can corrupt or delete data

Trogans

Trogans

- A stand alone program that is disguised as another file or program

Worms

Worms

- Similar to a computer virus- a program that can replicate itself


- Different from a virus because it doesn't need to attach itself to an existing program.


- Cause harm to computers, networks, data and clog up bandwidth

Phishing

Phishing

- Attempts to trick people into giving personal data


- Often look very convincing

Spyware

Spyware

- A software that is installed on a computer system and collect information about the user without their knowledge


- Can record personal data such as log in details, credit card and bank account details


- Can change computer settings without the user knowing

Adware

Adware

- Advertising supported software


- Any software that automatically shows adverts to the user, such as pop ups


- Harmless in themselves, but viruses can be hidden within the software

Hacking

Hacking

- Finding a weakness in security of a computer or network and exploiting it to gain access to their system.


- Gaining access to data without user's permission


- Motivated by many reasons e.g. profit, protest, challenge

Denial of service attacks (DOS)

Denial of service attacks (DOS)

- Systems are overrun with traffic, preventing genuine users from getting access


- Attacks are often for political reasons and target high profile companies that people think have been unethical

Physical threats

Physical threats

Peripherals (e.g. keyboards, monitors, memory sticks) can be lost, stolen or damaged


-Portable storage devices are most susceptible to accidental lost or change