This test is run by .
Note that your final mark will not be saved in the system.
Note that your final mark will not be saved in the system.
B1 Threats to data MatchUp
Target Level
Pass
Running Total
0
0%
Attempt
1 of 3
Click on a top box, then click on its match below. Or, drag a top box and drop it onto the correct match. Match all pairs before clicking ‘Check’.
Shoulder surfing
Virus
Spyware
Pharming
Denial of Service (DoS)
Worm
Phishing
Ransomware
Man-in-the-middle
Malware that spreads by injecting its code into other files on the computer system
Malware that replicates itself to spread throughout a computer system
Malware that restricts a user's access to their computer system to make them give money to the attacker
Software that collects data from a computer system
Attack whereby a website or network is flooded with traffic in a deliberate attempt to bring it down
Impersonating a trusted person or organisation in order to steal data or manipulate the user of a system
Type of attack that redirects users from a legitimate website to a fake website designed to steal their data
Watching somebody as they enter data, such as passwords, into a system
Intercepting communications between two users in order to gain access to conversations, could be done using a fake wireless access point