Social engineering is the art of ____ so they give up ____! There are lots of different forms of social engineering. ____ or pretexting is the act of creating and using ____, to engage a targeted victim in a manner that increases the chance the victim will divulge information, ____, that would be unlikely in ordinary circumstances. For example, a ____ might find some information about you ____. If you tweeted complaining about the service in your local bank branch; the blaggers could phone you up pretending to be from your bank. They report some ____, they need to ____ to unfreeze it. They have your name, location and date of birth from social media already. You to ‘confirm’ ____, and they have all your banking details. To try and prevent being a victim of blagging, Do not give out ____ - particularly in a ____. If a company contacts you, ____ so you can prove who they are. If they can’t, or you aren’t sure, then you should contact the company directly yourself to check they are who they say they are. ____ is a cyber attack intended to ____. This is done by either changing the host files on the victim’s computer, or by affecting the ____ which redirects web-traffic. A Domain Name System server acts like the contacts app on your phone but instead of clicking on a friend's name and it calling their phone number. You enter a domain name and it connects your browser to the correct IP address for that company. IF it has a ____ that takes you to a ____ you enter your ____ and they have everything they need to access your account. Look for the ____ on the URL bar and look for websites with ____. ____ or shoulder-surfing is observing a ____ over their shoulder eg cashpoint machine ______. This may be done in-person or ____. To avoid being a victim of this, avoid entering ____ - particularly bank details. ____ the PIN or information is also important, and just generally looking around to see if there is anything suspicious. ____ is a technique of fraudulently obtaining private information, often using ____ or SMS. The key difference between phishing and blagging, is that ____, whilst phishing is broader and hopes to get someone to bite. A common phishing scam currently is the use of ____, where a ____ is sent ____ it is from a real company. They then ask you to ____ which takes you to a ____ where you need to enter ____ and password. Never click on ____ or links from strange addresses If it uses ____ don't trust it. Don't click on ____ in emails. Malicious Code Malware (short for ____) is an umbrella term used to refer to a variety of forms of ____. Virus - A ____ is a piece of ____ that ____ and when executed, is able to replicate itself without the user’s consent. They usually perform a harmful activity on the computer such as using hard disk space, ____ or even turning the computer into a zombie. Trojan - A ____ is malware disguised as ____ trojans sit on the computer and allow the cyber-thieves to ____. Typical things that a trojan might do include ____, modifying or ____ or just disrupting the performance of the computer. ____ but are often used in phishing scams. Spyware - These are programs that ____ what you do on the computer. They could be used for legitimate purposes, but are often used ____. One form of spyware is a ____ which monitors ____, and uses these to steal ____. Adware - some adware is software that contains advertisements, such as ____. These are often ____ which make use of advertising revenue to provide free/cheap games to customers. The other definition is a form of ____ that is used to provide ____. For example, when using a web browser, you may decide to start looking up flights to the USA on Google, and suddenly all the adverts provided on social media are about things to do in the USA, and cheap flight companies. For each of the statements below add the name of activity described: The art of manipulating people so they give up confidential information! ____ A self-replicating piece of code. ____ Using information already known about an individual to gain credibility and trust to get them to divulge sensitive information. ____ Program masquerading as something useful, but often instead creates a backdoor into the computer. ____ Posing as a trustworthy entity in electronic communication. ____ Stealing information through direct observation. ____ Redirecting a user to a fake website. ____ Using targeted adverts based on previous browsing habits, or legitimate advertising used to create a revenue stream for free games. ____ Software that observes what you do on the computer ____ records key strokes on your computer ____ software scans all forms of storage devices for viruses and, if found, attempts to remove them. ____ Authentication techniques that rely on measurable physical characteristics (eg fingerprint or iris) ____ Completely automated public Turing test to tell computers and humans apart. This is a way of working out if a user is a human or robot by asking them to identify image features. ____ A person who tries to gain unauthorised access to a computer. ____ A unique address for each computer device on a network. ____ software written to harm or cause issues with a computer. ____ An update to a piece of software, usually to fix bugs or improve the software in some way. ____ Any computer program designed to replicate and damage other computer systems and software. ____ Malware that appears legitimate, but performs some malicious activity when it is run. ____ A computer that holds data to be shared with other computers. ____ Malware which encrypts a user's files, then demands a ransom payment to decrypt them. ____ A cyberattack that redirects a user from a genuine website to a fake one. ____
0%
3.6 cyber security GCSE
Share
Share
Share
by
Shamrockwws
Secondary
Computing
Cybersecurity and Online Safety
Cybersecurity
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Complete the sentence
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?