Save
...
Paper 2
Unit 8 - Security
Security 8.1.3
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Dylan Tappenden
Visit profile
Subdecks (1)
BIT - Threats to data
T-Level DPDD > Paper 2 > Unit 8 - Security > Security 8.1.3
107 cards
Cards (119)
DDOS is different from DOS as it needs a
botnet
Every time a user sends a
request
or accesses a webpage or app a
remote API
is used
The
deep web
is all websites not indexed by most search engines
Baiting
tries to trick the
victims
to give them stuff.
Phishing
tries to get user
input
of sensitive data by providing a
false UI
Pharming
is an attack where a
fake
website is provided, and user input is stolen
Pretexting
is when a cyber criminal lies to get data or information, such as a deepfake hostage
Quid pro quo tries to disable
anti-virus
so that
malware
can be installed
Scareware
is a
malicious
computer program. Is designed to intimidate a user into doing something they wouldn't otherwise do
SMishing is
phishing
specifically through
text messages
If an API is
insecure
it can be
exploited
A API is used to
communicate
between different
servers
See all 119 cards