Save
...
Computer Science
EoYs
Cybersecurity
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
rileyy
Visit profile
Subdecks (1)
Protection
Yr 8 > Computer Science > EoYs > Cybersecurity
4 cards
Cards (27)
What is
Data?
Raw
facts
and
figures
When is
information
created?
When
data
has been
processed
and becomes
meaningful.
Data
can be used to create
useful
information
and build a
customer profile
.
Data might be collected like:
Personal info
: name, DoB
Content
: images, status updates
User behaviour
: what pages you visit / like
Data
on
others
: names of friends, phone numbers
What is
Social
Engineering?
A set of
methods
used by
cyber
criminals
to
deceive
individuals into handing over
info.
What is
Shouldering?
It’s designed to steal
passwords
by watching the victim enter
sensitive
info.
What is are
Name
Generator
Attacks?
It asks for
info
through an
app,
social
media
post
or
quiz
to collect
personal details
.
What is
Phishing?
A
victim
receives an
email
disguised to look as if it came from a
reputable
source.
Some phishing examples:
email
usually provides a
link
unexpected
email with a request for
info
suspicious
hyperlink
and
spelling
/
grammar
mistakes
What is
Blagging?
When someone
tricks
you in
person
or on the
phone
by
pretending
to be
someone
else
to get your
personal info
or
money.
What is
Hacking?
Gaining
unauthorised
access
to or
control
of a
computer system
.
What is a
Denial
of
Service
attack
(DoS)?
A
criminal
makes a
network
or
website
unavailable
by sending lots of
requests
to
overload
it.
What is a
Distributed
Denial
of
Service
Attack
(DDoS)?
Same concept as a
DoS
attack but with
more
computers
at the
same
time.
What is a
Brute
force
attack?
A form of
attack
that makes
multiple
attempts
to discover something.
Computer Misuse Act
1990
:
S1:
unauthorised
access to
computer
material
S2:
unauthorised
access with
intent
to
commit
or
facilitate
the commission of other
offences
S3:
unauthorised
access to
impair
What is
Malware?
A
software
designed to
gain
access.
What are
Viruses?
Self-replicating
software
,
modifying
code.
What are
Worms?
They
replicate
and
spread
through
network
.
What is
Ransomeware?
It copies itself,
locks
your
computer
by encrypting
files
and then ask for
money
to
unlock
them.
Worms
spread of their
own,
while
Viruses
need to
attack
to something.
What is
Trojan?
It
looks
helpful
but secretly does
harmful
things.
What is
Spyware?
It’s
unwanted
software
that
watches
what you do and
collects
your
info
without
permisson
.
What is
Adware?
It makes your
device
show unwanted
ads
or
pop-ups
when you’re
online.
See all 27 cards