Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
8 Cards in this Set
- Front
- Back
File Virus |
A destructive piece of software that attaches itself to a file. It can reproduce itself and spreads to other files without your knowledge. |
|
Phishing |
Criminals send out emails that appear to comefrom legitimate sites such as PayPal, eBay or banks to get someone’s usernameand password or personal details. |
|
Online Fraud |
Type of cybercrime fraud or deception whichmakes use of the Internet |
|
Anti-virus Software |
Can screen e-mail attachments, Web downloads, and check all of your files from time-to time, removing any viruses that are found. |
|
Identity Theft |
When criminals use your identity for their own financial gain – which ultimately costs you dearly. |
|
Keylogging |
Activity-monitoring software programs that givehackers access to your personal data. The passwords and credit card numbers youtype, the webpages you visit – all by logging your keyboard strokes. Thesoftware is installed on your computer, and records everything you type. Thenit sends this log file to a server, where cybercriminals wait to make use ofall this sensitive information. |
|
Email Virus |
This is hidden inside an email attachment and when the attachment is opened the virus infects the computer being used. |
|
Virus |
Attaches to a program file and runs when theprogram runs. Can only infect executable files, not data files. |