Edexcel GCSE Computer Science

5.2.3: understand different forms of cyberattack (based on technical weaknesses and behaviour) including social engineering (phishing, shoulder surfing), unpatched software, USB devices, digital devices and eavesdropping

Keywords:
Communication and the Internet
Test your self on these keywords and definitions using the games below or Play random game
KeywordDefinition
DDOSa type of computer attack where a computer or network service is shut down due to being overwhelmed by a high volume of traffic distributed from a large number of computers
Digital devicessmall computers (e.g Raspberry Pi) which can be connected to a network then hidden away whilst they harvest sensitive data
DOSa type of cyber attack where a computer or network service is shut down due to a being overwhelmed by a high volume of traffic from one computer
Eavesdroppingthe process of inspecting network traffic from other devices in order to find sensitive data like usernames and passwords
Phishinga form of cyberattack where users are asked to enter their personal details into a fake login form which will harvest their credentials
Ransomwaretype of malware which encrypts files and demands payment from a user before they can decrypt and access their data
Shoulder surfinga form of cyberattack where a person or device watches people as they enter their passwords in order to harvest their credentials
Social engineeringa form of cyber attack (including phishing and shoulder surfing) where people are tricked into giving away their credentials
Unpatched softwareapplication or operating system software where a vulnerability has been identified that hasn't yet been fixed and could be exploited by hackers
USB deviceshacking devices made to look like mice or keyboards which may install keyloggers, viruses or other malicious software
Keyword games:
Resources: