Cyber Security CVHS KS3 Questions and Answers Graded A
Cyber Security CVHS KS3 Questions and Answers Graded A Botnet An interconnected network of malware controlled computers, often used to launch DDoS attacks. Malware Malicious software that is installed on a computer device without the user's knowledge. Social Engineering The art of manipulating people into revealing confidential information. Hacking Finding weaknesses in a computer system and attempting to exploit them. White Hat Hacking Hackers are given permission to hack into systems to identify loopholes and weaknesses. Grey Hat Hacking Hacking into systems for 'fun' or to 'troll' Black Hat Hacking Hacking into systems with malicious intent to steal, exploit and sell data. Pharming When visitors to a genuine website are redirected to a fake one without the knowledge or consent of the users. Distributed Denial of Service (DDOS) An attempt to make a computer network unavailable to users where the network is flooded by network traffic. Adware Not often malicious however contains advertising within the software. Trojan A program disguised as a harmless application that actually produces harmful results. Rootkit A program that hides in a computer and allows someone from a remote location to take full control of the computer. Bot Used to gain control over a computer to perform automated tasks. Spyware Software which is installed without the user's knowledge and may gather information about their habits. Ransomware Malicious software that threatens to publish or delete the victims data. By encrypting it, they block all access to this data until a payment has been paid. Worm They spread from one device to another by copying themselves. They do not have to work with other programs. Virus Type of malware that will spreads quickly through your device. It can cause your computer to flow down or lose all of your work. Bug Malfunction or errors in the software that can cause it to crash or be vulnerable to attack. Phishing An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information. Baiting Tries to get victims to give cyber criminals the information they need by making a promise of goods to get the information. Tailgating / Piggybacking When someone who does not have authority to enter a building or room, following someone who goes through the doors, or where an attacker is pretending to be a delivery driver and asking someone of authority to hold the door. Shoulder Surfing When a person's private and confidential information is seen. For example, the attacker may stand very close to the person using a cash machine in order to see their PIN number. Vulnerabilities Weaknesses that allow an attacker to launch a cyber-security attack.
Written for
- Institution
- Cyber Security CVHS KS3
- Course
- Cyber Security CVHS KS3
Document information
- Uploaded on
- October 7, 2023
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cyber security cvhs ks3 questions and answers grad
Also available in package deal