Cyber security

Subdecks (4)

Cards (28)

  • Cyberattacks are carried out using various types of malware (malicious software)
  • Viruses
    Programs that can replicate themselves and be spread from one system to another by attaching themselves to host files. They are used to modify or corrupt information on a targeted computer system.
  • Worms
    Self-replicating programs that identify vulnerabilities in operating systems and enable remote control of the infected computer.
  • Spyware
    Installed by opening attachments or downloading infected software. Spyware can be used to collect stored data without the user’s knowledge.
  • Trojans
    Programs that appears to perform a useful function, but also provide a ‘backdoor’ that enables data to be stolen.