Cyberattack

Cards (5)

  • Protections against malware
    • Install anti-virus software
    • Use a firewall
    • Keep the operating system up to date
    • Use the latest version of browsers
    • Look out for phishing emails
  • Secure by design
    An approach to make software systems as free of vulnerabilities as possible through continuous testing and adherence to best programming practices
  • A program that appears to perform a useful function but also provides a ‘backdoor’ that enables data to be stolen. - Trojan
  • Installed by opening attachments or downloading infected software and can be used to collect stored data - Spyware
  • Self-replicating program that identifies vulnerabilities in O/S's and enables remote control of the infected computer - Worm