Types of online threats

Cards (12)

  • Phishing
    An email sent from an internet criminal disguised as an email from a legitimate trustworthy source. The message is meant to lure you into revealing sensitive or confidential information
  • Pharming
    A malicious website that resembles legitimate website used to gather usernames and passwords
  • Internet scam
    • A type of scam that misleads the user in many ways attempting to take lead of them
    • The purpose of this scam is to cheat the target of their personal property directly rather than private information through fabricated promises confidence tricks and many more
  • Internet bots
    • A network of zombie computers that have been taken over by a robot or bought that performs large scale malicious acts for the creator of the botnet
    • Captcha technology is used to avoid this type of security threat
  • Malware
    Generic term for spyware and adware. It is a malicious software disguised as real software often secretly installed intended to transfer and gather private information like passwords without the user's permission.
  • Types of malware
    • Adware - a type of malware that automatically delivers advertisements
    • Spyware - a type of malware that functions by spying on user activity without their knowledge
  • Virus and worm
    • Virus is a program designed to replicate by attaching itself into other computer programs data files or the boot sector of the hard drive
    • Worm can be injected into a network by any types of means like a usb stick or an email attachment
  • Computer bug
    • A malfunction in a computer system through its runtime
    • The term bug originated to the most found on the mark ii by grace hopper that caused a system of function
  • Cyberstalking
    The use of the internet or other electronic device to harass or stalk individuals group or organization
  • Cyberbullying
    The act of tormenting threatening harassing or embarrassing another person using the internet or other technologies
  • Spam
    An unsolicited email instant messages or social media messages. These messages are fairly easy to spot and can be damaging if you open or respond
  • Spoofing
    Describes a criminal who impersonates another individual or organization, with the intent to gather personal or business information