Save
...
ESSENTIALS!
1st Session
Cyberattack
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Ben Griffiths
Visit profile
Cards (5)
Protections against malware
• Install
anti-virus
software
• Use a
firewall
• Keep the
operating system
up to date
• Use the latest version of
browsers
• Look out for phishing
emails
Secure by design
An approach to make software systems as free of vulnerabilities as possible through
continuous
testing and adherence to best
programming
practices
A program that
appears
to perform a useful
function
but also provides a
‘backdoor’
that enables data to be
stolen.
-
Trojan
Installed by opening
attachments
or downloading
infected
software and can be used to collect
stored
data -
Spyware
Self-replicating
program that identifies vulnerabilities in O/S's and enables
remote
control of the
infected
computer -
Worm