100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Resumen

Summary GCSE OCR Threats To Computer Systems Poster

Puntuación
-
Vendido
-
Páginas
2
Subido en
27-05-2024
Escrito en
2023/2024

GCSE OCR Threats To Computer Systems Poster with all the information required for the course.

Institución
Grado

Vista previa del contenido

Threats to Computer Systems
Malware – designed to disrupt, damage or gain unauthorised access to a computer
Virus – A type of malicious software able to spread between computers and causes damage to data and software.
Worm – Its primary function is to spread replicas of itself from one device to another and it remains active on infected
computers.

Trojan – It disguises itself as a legitimate application or masks its true intent which is to spread malware.
Adware - Pop-up advertisements that show up on your computer or mobile device. It has the potential to become malicious
and harm your device by slowing it down, hijacking your browser and installing viruses and/or spyware.

Spyware - Malicious software that enters a user's computer, gathers data from the device and user, and sends it to third
parties without their consent.

Ransomware - Prevents you accessing your device and the data stored on it, usually by encrypting your files. A criminal
group will then demand a ransom in exchange for decryption.

Scareware - Claims to have detected a virus or other issue on a device and directs the user to download or buy malicious
software to ‘resolve’ the issue.

Rootkits – It allows an external party to maintain command over a device without the user being aware of it. The controller
has the ability to remotely execute files and change system configurations on the host machine.

Pharming – It redirects a user from a genuine website to a fake one.

Social engineering – manipulating, influencing or deceiving victims to gain control over computer systems
Phishing – A scam that prompts the user to click on a link and disclose personal information like passwords and usernames
for a particular site.

Spear phishing - Spear phishing is a more targeted cyber-attack than phishing. Emails are personalized to the intended
victim. For example, the attacker may identify with a cause, impersonate someone the recipient knows, or use other social
engineering techniques to gain the victim's trust.

Tailgating - a cyber-attack used to gain unauthorized access to online accounts or systems protected by a password.

Other threats
Brute force attacks – a computer algorithm will use trial and error to crack passwords or encryption keys.
Denial of service attacks – Multiple computers will repeatedly send requests to a particular server to overload it and
prevent other users accessing it.

Data interception and theft – Where sensitive data is intercepted during transmission. Usually, a packet sniffer is utilised
and the data collected is sent back to the hacker

SQL injection – Vulnerability in the security of a website allowing attackers to gain access to the database by placing some
simple SQL code at the end of the username or password query.

Escuela, estudio y materia

Institución
Estudio
Grado
Año escolar
200

Información del documento

Subido en
27 de mayo de 2024
Número de páginas
2
Escrito en
2023/2024
Tipo
RESUMEN

Temas

$8.77
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
adigoniefire

Documento también disponible en un lote

Conoce al vendedor

Seller avatar
adigoniefire
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
-
Miembro desde
1 año
Número de seguidores
0
Documentos
10
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes