• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/8

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

8 Cards in this Set

  • Front
  • Back

File Virus

A destructive piece of software that attaches itself to a file. It can reproduce itself and spreads to other files without your knowledge.

Phishing

Criminals send out emails that appear to comefrom legitimate sites such as PayPal, eBay or banks to get someone’s usernameand password or personal details.

Online Fraud

Type of cybercrime fraud or deception whichmakes use of the Internet

Anti-virus Software

Can screen e-mail attachments, Web downloads, and check all of your files from time-to time, removing any viruses that are found.

Identity Theft

When criminals use your identity for their own financial gain – which ultimately costs you dearly.

Keylogging

Activity-monitoring software programs that givehackers access to your personal data. The passwords and credit card numbers youtype, the webpages you visit – all by logging your keyboard strokes. Thesoftware is installed on your computer, and records everything you type. Thenit sends this log file to a server, where cybercriminals wait to make use ofall this sensitive information.

Email Virus

This is hidden inside an email attachment and when the attachment is opened the virus infects the computer being used.

Virus

Attaches to a program file and runs when theprogram runs. Can only infect executable files, not data files.