click below
click below
Normal Size Small Size show me how
J277 1.4.1
Threats to computer systems and networks
Term | Definition |
---|---|
Malware | Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems |
Data Interception | Using packet sniffers to intercept data during transmission |
Brute–force attacks | A method of trying all possible combinations to guess a password or encryption key |
Denial of Service Attack | Cyber attacks that overwhelm a network or system by flooding it with requests, making it inaccessible to users |
SQL injection | A technique where malicious code is inserted into a website form to manipulate or extract data. |
Ransomware | Telling the user their computer is infected to scare them into buying a solution |
Cybercriminal | An online/computer criminal |
Hacking | The use of computers to access data without authorisation |
Virus | Attach themselves to certain files and spread across a system |
Worm | A Self replicating type of malware |
Trojan | Malware disguised as something safe. |
Social Engineering | A way of gaining sensitive info by manipulating people usually over the phone or phishing emails |
Phishing | When emails or texts are sent pretending to be from a bank or retailer asking you for sensitive info |