Terms in this set (14)
A phishing attack that automatically redirects the user to a fake site.
Manage to obtain information by using persuasion and manipulation
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Observing a person's private information over their shoulder e.g. cashpoint pin number
software designed to infiltrate or damage a computer system without the user's informed consent
software that automatically displays or downloads advertising material (often unwanted) when a user is online.
A program disguised as a harmless application that actually produces harmful results.
A type of Malware that locates and saves data from users without them knowing about it.
a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
The art of manipulating people in order to get information
Disks that are inserted or attached to a computer such as a USB drive.
a step-by-step procedure for solving a problem
A diagram that shows step-by-step progression through a procedure or system especially using connecting lines and a set of conventional symbols.
Something put into a system, such as resources, in order to achieve a result.
YOU MIGHT ALSO LIKE...
Introduction to Business | Gaspar, Bierman, Kolari, Hise, Smith, Arreola-Risa
Content, Internet Identity, and Device Management Terminology
THIS SET IS OFTEN IN FOLDERS WITH...
BBC Bitesize Glossary