Please enable JavaScript.
Coggle requires JavaScript to display documents.
5.3 Threats (Phishing (It is a fraudulent attempt to obtain sensitive…
5.3 Threats
Phishing
It is a fraudulent attempt to obtain sensitive information like bank details through electronic communication.
Hacking
It is an unauthorised intrusion into computer or a network. Hacking can be external. Hacking can also be internal where employees hack their own system.
-
Trojan Horse
It is any malware which misleads users of its true intent. It is a piece of code which is introduced into the system which will have a detrimental effect on the system.
-
-
-
Explain the difference between a Worm Virus and a Trojan Horse Virus?
A worm virus spreads from computer to computer and the trojan horse virus hides in the code and steals information and does not replicate itself.
How could you avoid getting a Virus?
One way you could avoid getting a virus is download an antivirus software.
How could someone avoid being Phished?
One way someone could avoid being phished is by downloading an anti-phish toolbar which provides information about the website which you are browsing on the internet.
How can someone avoid being Hacked?
Make sure to change passwords regularly.
Download from only authorised sources.
Turn the device off or log off when not using the device.
Interception
It is when data packets are intercepted by a third party. The packets are then copied, edited or transferred to another location.
-
-
Social Engineering
It is the manipulation of people into performing actions or divulging confidential information.