Save
IT
Save
Share
Learn
Content
Leaderboard
Learn
Created by
NUS lalala
Visit profile
Subdecks (1)
PLANNING TOOLS
IT
7 cards
Cards (30)
Types of Social engineering
Baiting
Influencing
and
manipulating
people
Phishing
Pretexting
Quid Pro Quo
Scare ware
Shoulder Surfing
Social engineering
People trying to take your
personal
info. (bank Details, address....)
Phishing
Making a
copy
of a website (Shane with
personal
details)
Pretexting
Making you confirm something
fake
by asking
personal
details
Quid Pro Quo
Calls random
numbers
pretending to offer
help
Scare ware
Convinces users to download malicious software
Shoulder Surfing
Individual
watches
you whilst you are using a device in
Public
Types of malware
Worm
Trojan horse
Adware
Botnet
Ransomware
Spyware
Virus
Worm
Malicious
Programme, that spreads copies of it
self
from device to device
Trojan horse
Software (seems valid) but it's
malicious
and allows another
computer
to take control of ur device
Adware
Software that shows an
advert
to the user
Botnet
Group of
users
internet connected devices which are running a
bot
Ransomware
When they
log
you off then asks you to
Pay
to have access again
Spyware
Monitors
,
collects info
of what you are doing on the device
Virus
A
harmful
software that
replicates
itself to another Programme
Types of threats
Denial
of service
Hacking
Malware
Denial of service
A deliberate attempt to
Prevent users
from accessing the services, DoS attack will come from a single computer sending
multiple requests
to the server
Hacking
When individual looks for a
weakness
in a computer system, tries to
exploit
it
Black Hat
Stealing data
, causing
Problem
with the system
Grey Hat
Has
Permission
to attack and find
weaknesses
White Hat
Attacks for fun than will
fix
for
free
Malware
Software that has been designed to cause a
security risk
on a device or Computer network
Exploit
To take
advantage
of
See all 30 cards