External Threats - Match-up

Match-up definitions and answers with key terms and examples. Press submit to check your answers.

External Threats
Unauthorised Access
Malware
Denial-of-Service
Distributed Denial-of-Service
Phishing
Pharming
Social Engineering
Shoulder Surfing
Man-in-the-Middle
Black Hat Hacking
White Hat Hacking
Grey Hat Hacking


Answers
Intercepting and potentially altering communications between two parties without their knowledge
Malicious software designed to damage, disrupt, or steal data
Accessing a system without permission, commonly known as hacking
Deceptive emails mimicking legitimate sources to steal sensitive information
Redirecting users to fake websites to steal personal information by compromising DNS servers
Attacks on IT systems from outside sources, typically through the internet
Tricking individuals into revealing sensitive information through deception
Observing someone's confidential information by physically looking over their shoulder
Hacking without the owner's permission but without exploiting any weaknesses found
Overloading a server with requests to disrupt its normal operations
Legal hacking performed to test and improve system security
Unauthorised hacking with malicious intent or illegal purposes
A coordinated DoS attack from multiple infected computers (botnet) to overwhelm a target
Log in or sign-up to access the match-up activity



Don't have a login?

You can still revise this topic