Game Preview

Cyber Security

  •  English    32     Public
    KS4 terms
  •   Study   Slideshow
  • a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
    computer virus
  •  15
  • A virus that gains access to a computer by masquerading as a harmless program that a user innocently installs on the computer. They steal information and are ha
    trojan horse
  •  15
  • Similar to a virus, but it has the capability to travel without any human action so it can infect many computers. It is able to replicate itself and can use the
    worm
  •  15
  • a way of attempting to acquire information, by pretending to be from a trustworthy source.
    Phishing
  •  15
  • malicious software secretly installed to collect information from someone elses computer
    spyware
  •  15
  • computer components and storage devices can easily be lost or stolen
    loss or theft
  •  15
  • any software program that automatically plays, displays, or downloads advertisements to a computer that is unwanted
    adware
  •  15
  • Attempts to gain unauthorized entry into a computer system or network.
    hacking
  •  15
  • attack- flooding a website with useless traffic to inundate and overwhelm the network
    denial of service (DoS)
  •  15
  • spyware that records every keystoke made on a computer to steal personal information or passwords or to launch internet attacks
    keylogger
  •  15
  • someone who accesses a computer or network illegally
    hacker
  •  15
  • A crime that involves someone pretending to be another person in order to steal money or obtain benefits
    identity theft
  •  15
  • refers to the range of measures that can be taken to protect computer systems, networks and data from unauthorised access or cyberattack.
    cyber security
  •  20
  • a program that can be loaded into memory when the computer is running. It monitors activity on a computer system for the signs of virus infection.
    anti virus software
  •  20
  • software or hardware security system that controls the incoming and outgoing network traffic. Packets of data are analysed to determine whether they should be
    firewall
  •  20
  • involves tricking a user into giving out sensitive information such as a password, by posing as a legitimate system administrator.
    Social Engineering
  •  20