Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
8 Cards in this Set
- Front
- Back
Opportunist Threats |
If you leave your computer unattended and left logged in, somebody may take advantage by viewing, stealing or deleting files, programs or hardware.
|
|
Computer Viruses
|
These are small, malicious programs that can replicate themselves by spreading between computers. They are never beneficial.
|
|
Computer Worms
|
Worms are malicious programs that spread with the help of the Internet.
|
|
Trojan Horses
|
Allows a hacker full control of your system.
|
|
Spyware
|
Software that enables a user to get information secretly about another person’s computer activities. Can track keystrokes and can transmit data from your hard drive secretly.
|
|
Phishing
|
Attempts to get your personal information, such as a credit card information, by pretending to be a legitimate company. Phishing emails can take you to a website that looks real, but will steal your information.
|
|
Accidental Damage
|
Physical damage due to natural disasters, practical jokes and no concentration.
|
|
Data Protection Act
|
A UK law passed to prevent customers' personal data from being compromised.
|