click below
click below
Normal Size Small Size show me how
J277 1.4.1
Threats to computer systems and networks
| Term | Definition |
|---|---|
| Malware | Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems |
| Data Interception | Using packet sniffers to intercept data during transmission |
| Brute–force attacks | A method of trying all possible combinations to guess a password or encryption key |
| Denial of Service Attack | Cyber attacks that overwhelm a network or system by flooding it with requests, making it inaccessible to users |
| SQL injection | A technique where malicious code is inserted into a website form to manipulate or extract data. |
| Ransomware | Telling the user their computer is infected to scare them into buying a solution |
| Cybercriminal | An online/computer criminal |
| Hacking | The use of computers to access data without authorisation |
| Virus | Attach themselves to certain files and spread across a system |
| Worm | A Self replicating type of malware |
| Trojan | Malware disguised as something safe. |
| Social Engineering | A way of gaining sensitive info by manipulating people usually over the phone or phishing emails |
| Phishing | When emails or texts are sent pretending to be from a bank or retailer asking you for sensitive info |