Security Risks Flashcards
13 Questions
100 Views

Security Risks Flashcards

Created by
@BeneficialThermodynamics

Questions and Answers

What is a computer program that is created to deliberately cause harm to a computer?

Virus

How can viruses be spread?

By infected storage devices and opening emails or email attachments.

What 2 types of security risk spread themselves by replication?

Worms and viruses

What security risk often uses security networks to spread itself?

<p>Worms</p> Signup and view all the answers

What type of security risk relies on security failures?

<p>Worms</p> Signup and view all the answers

What type of security risk pretends to be something it's not?

<p>Trojans</p> Signup and view all the answers

What type of security risk doesn't replicate itself?

<p>Trojans</p> Signup and view all the answers

What type of security risk attacks networks in order to bring them to a standstill?

<p>Denial of Service Attacks</p> Signup and view all the answers

What type of security risk gathers user information without their knowledge or consent?

<p>Spyware</p> Signup and view all the answers

What type of security risk records the real time activities of a computer user (including the keys they press)?

<p>Keylogging</p> Signup and view all the answers

What type of security risk is used for identity theft?

<p>Phishing</p> Signup and view all the answers

What type of security risk is usually attempted by sending an e-mail falsely claiming to need some sort of detail?

<p>Phishing</p> Signup and view all the answers

What type of security risk is when someone pretends to be someone else (in order to gain some sort of resource, benefit or credit)?

<p>Identity theft</p> Signup and view all the answers

Study Notes

Security Risks Overview

  • Viruses are malicious computer programs specifically designed to cause harm to computer systems.
  • Viruses can spread through infected storage devices and by opening emails or attachments containing malicious content.

Types of Security Risks

  • Worms and viruses are notable for their ability to replicate themselves, facilitating their spread.
  • Worms leverage security network vulnerabilities to propagate, often exploiting weak points in system defenses.
  • Unlike worms and viruses, Trojans do not replicate; they disguise themselves as legitimate software to deceive users into downloading them.

Attack Methods and Objectives

  • Denial of Service (DoS) attacks aim to incapacitate networks, rendering them non-functional by overwhelming them with requests.
  • Spyware discreetly collects user data without their knowledge, posing significant privacy risks.
  • Keyloggers monitor and record a user's live actions on their devices, including keystrokes, which can be utilized for malicious purposes.

Identity and Security Fraud

  • Phishing is a deceptive practice often employed for identity theft, involving emails that impersonate legitimate entities to solicit sensitive information.
  • Identity theft occurs when an individual impersonates another person to obtain benefits, resources, or credit fraudulently.

Summary of Key Security Risks

  • Viruses: Malicious programs that cause harm.
  • Worms: Self-replicating threats that exploit network vulnerabilities.
  • Trojans: Disguised malware without replication capabilities.
  • Denial of Service Attacks: Network incapacitation tactics.
  • Spyware: Data collection without user consent.
  • Keylogging: Capturing user input in real time.
  • Phishing: Email-based deception for identity theft.
  • Identity Theft: Fraudulent impersonation for illicit gain.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on security risks with these flashcards. Learn about computer viruses, their definitions, and how they spread. Understand the different types of security threats that can affect your devices.

More Quizzes Like This

Malicious Software Quiz
10 questions
Computer Viruses and System Security
11 questions
Network Security and Types of Malware
10 questions
Use Quizgecko on...
Browser
Browser