• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/8

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

8 Cards in this Set

  • Front
  • Back

Opportunist Threats

If you leave your computer unattended and left logged in, somebody may take advantage by viewing, stealing or deleting files, programs or hardware.
Computer Viruses
These are small, malicious programs that can replicate themselves by spreading between computers. They are never beneficial.
Computer Worms
Worms are malicious programs that spread with the help of the Internet.
Trojan Horses
Allows a hacker full control of your system.
Spyware
Software that enables a user to get information secretly about another person’s computer activities. Can track keystrokes and can transmit data from your hard drive secretly.
Phishing
Attempts to get your personal information, such as a credit card information, by pretending to be a legitimate company. Phishing emails can take you to a website that looks real, but will steal your information.
Accidental Damage
Physical damage due to natural disasters, practical jokes and no concentration.
Data Protection Act
A UK law passed to prevent customers' personal data from being compromised.