• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back
Card skimmer
Card skimmer
Device that reads the magnetic data from a bank card.
Click-jacking
Click-jacking
An attack in which a site appears to do one thing but your clicks are actually redirected to do something else: e.g. a button on a web page that seems to be a free download of a desktop wallpaper but that actually makes you ‘like’ a different page on Facebook.
Computer virus
Computer virus
A program that is written to disrupt the normal functioning of a person’s computer without their knowledge or consent.
Computer worm
Computer worm
Malware that is able to distribute itself over a network, normally via email, without a person having run an infected program.
Cyber-bullying
Cyber-bullying
The spreading of rumours, gossip and the general bullying of another person using digital communication methods.
Cyber-stalking
Cyber-stalking
Using the internet to stalk or harass someone.
Cyberterrorism
Cyber-terrorism
A type of internet attack that attacks parts of a country’s IT infrastructure.
DoS attack
DoS attack

(Denial of Service)

An attack that uses thousands of compromised computers (bots) to flood a server with requests for information. The attack is successful if the server becomes so overwhelmed that normal users cannot access the system.
Email spoofing
Email spoofing
The forgery of an email header so that the email appears to be from a different origin (or person).
Hoax (internet)
Hoax (internet)
A message or article intended to deceive or defraud others. It can be sent via email, SMS, WhatsApp messages or Facebook and Twitter posts.
Keylogger
Keylogger
A type of spyware that records your keystrokes as you type (and possibly even the movements of your mouse and screenshots of what is being displayed) in an attempt to discover your usernames and passwords.
Malware
Malware (Malicious software)
Any software that is written with negative intentions.
Pharming
Pharming
A scamming practice where a user is automatically redirected to another (fake) website even if he/she types in the correct URL for the official website. The criminal is then able to use any data the user enters – usually passwords and PINs.
Phishing
Phishing
Attempts to con or trick the user into giving out personal, confidential details such as PIN numbers and passwords, usually by posing as a legitimate organisation, and usually via email.
Quarantine (virus)
Quarantine (virus)
Placing a virus in an area of the disk where it cannot infect the computer.
Ransomware
Ransomware
Malware that encrypts data (making it unavailable) until you pay the hacker a ransom fee.
SMiShing
SMiShing
When a phishing attack is done via an SMS on a smartphone.
Social engineering
Social engineering
The use of deception to manipulate or ‘con’ someone into giving out confidential information or into giving criminals access to their computer or premises. This can be used to impersonate them, to install malware, or for other fraudulent purposes.
Spyware
Spyware
Any technique or software that tries to monitor and track the way you use your computer, and then to report this information to a third party.
Trojan
Trojan
A destructive program disguised as a useful application. The program relies on you to activate it.
Bot (robot)
Zombie
A computer that has been compromised (or infected) and can be controlled remotely when it is on and connected to the internet.