Computerhelp4all logo Articles AboutTopicsQuizzesComputer Questions & AnswersComputer Terms & DefinitionsActivitiesContact

Page 1 - Threats To Systems, Data & Information

Threats To Systems, Data & Information 1
What Is A Cyberattack

What Is A Cyberattack?

Difficulty: Easy

A cyberattack is an intentional attempt to disrupt or harm a computer system or network. Cyberattacks are performed by cybercriminals with malicious intent.

What Is Cybercrime

What Is Cybercrime?

Difficulty: Easy

Cybercrime is a type of criminal activity carried out by a computer and a network. A person that engages in cybercrime is known as a cybercriminal.

What Is Phreaking

What Is Phreaking?

Difficulty: Medium

Phreaking is the act of exploiting vulnerabilities in telephone systems to gain unauthorised access to restricted telephone services or areas, often to obtain free phone calls.

What Is A Hacker

What Is A Hacker?

Difficulty: Easy

A hacker is a person that uses their technical skills to gain unauthorised access to computer systems. Hackers can gain unauthorised access to systems in...

What Is A Watering Hole Attack

What Is A Watering Hole Attack?

Difficulty: Medium

A watering hole attack is a type of cyberattack where the attacker identifies websites that are commonly visited by members of an organisation and infects them with malware.

What Is An Email Bomb

What Is An Email Bomb?

Difficulty: Medium

An email bomb, also known as a mail bomb, is a type of cyberattack where the attacker sends a large number of email messages to one or more email addresses to flood the mailboxes.

What Is A Potentially Unwanted Program

What Is A Potentially Unwanted Program?

Difficulty: Medium

A potentially unwanted program, also known as a potentially unwanted application, a PUP, a PUA, or junkware, is a type of program that is not strictly malicious, but may be unwanted for the user.

What Is A Brute-Force Attack

What Is A Brute-Force Attack?

Difficulty: Medium

A brute-force attack is a type of cyberattack where the attacker repeatedly submits large numbers of passwords in the hope of discovering the correct password.

What Is A Browser Hijacker

What Is A Browser Hijacker?

Difficulty: Medium

A browser hijacker is a type of malware that changes a browser's settings, appearance, theme, or behaviour without the user's permission.

What Is A Botnet

What Is A Botnet?

Difficulty: Medium

A botnet is a network of hijacked computers infected with malware that are controlled by a single attacking party to carry out cyberattacks and other malicious activities, like bringing servers down by DDoS attacks.

What Is A Logic Bomb

What Is A Logic Bomb?

Difficulty: Medium

A logic bomb is a piece of malicious code designed to carry out instructions when specific conditions are met. Logic bombs can be inserted into malware.

What Is Malvertising

What Is Malvertising?

Difficulty: Medium

Malvertising is the use of online advertising to spread malware or other unwanted software. Malvertisements infect systems with malware by embedding malicious links or code into them.

What Is Rogue Security Software

What Is Rogue Security Software?

Difficulty: Medium

Rogue security software is a type of malware that tricks users into thinking they have viruses or malware on their computers when they actually don't and misleads them with fake detections and alerts.

What Is Scareware

What Is Scareware?

Difficulty: Medium

Scareware is a type of malware designed to scare users into downloading and installing unwanted and often malicious software that is of little to no use to them.

What Is Riskware

What Is Riskware?

Difficulty: Medium

Riskware describes software that is not strictly malicious, but poses potential security risks due to software incompatibilities, security holes, or legal violations.

What Is A Backdoor

What Is A Backdoor?

Difficulty: Medium

A backdoor is a security vulnerability that allows an attacker to gain unauthorised remote access to the victim's computer without their permission or knowledge and bypass normal security mechanisms.

What Is A Rootkit

What Is A Rootkit?

Difficulty: Medium

A rootkit is a type of malware designed to give someone root or administrator-level access to a computer system without the user's permission or knowledge.

How To Remove A Computer Virus

How To Remove A Computer Virus? (Windows)

Difficulty: Medium

This article explores how you can get rid of a computer virus or other unwanted software on your computer and the steps you should take when your computer is infected with a virus.

How To Tell If A Download Is Safe

How To Tell If A Download Is Safe? - 8 Ways To Tell if A Download Is Safe

Difficulty: Easy

Wondering whether the file you have downloaded is safe before you open it? You may have had a time when you have received a file, but are just not sure of whether you can trust it.

What Is A Computer Worm

What Is A Computer Worm?

Difficulty: Medium

A computer worm is a type of malware that automatically spreads itself over a network and infects other computers without any interaction from the creators.

What Is A Zero-Day Vulnerability

What Is A Zero-Day Vulnerability?

Difficulty: Medium

A zero-day vulnerability, also known as a zero-day flaw, or a zero-day threat, is a security hole in a software program, operating system, website, web browser, hardware, or firmware, that...

What Is A Keylogger

What Is A Keylogger?

Difficulty: Medium

A keylogger is a type of spyware that records all keystrokes the user makes and sends that data to a third party. Keyloggers can record sensitive information, like usernames, passwords and bank details.

What Is Adware

What Is Adware?

Difficulty: Medium

Adware is a type of malware that displays unwanted ads on the victim's computer, often in their web browser, to generate revenue for the creator.

What Is Spyware

What Is Spyware?

Difficulty: Medium

Spyware is a type of malware that is designed to secretly monitor the victim's activity, gather information about them, and send it to a third party without their permission.

What Is Malware

What Is Malware?

Difficulty: Easy

Malware is specifically designed to harm a computer system. It is created with malicious intent to steal data, gain unauthorised access to...

What Is A Trojan Horse

What Is A Trojan Horse?

Difficulty: Medium

A Trojan horse, often shortened to a Trojan, is a type of malware that disguises itself as a safe and legitimate program when it actually performs malicious tasks.

What Is Ransomware

What Is Ransomware?

Difficulty: Medium

Ransomware is a type of malware that blocks access to a computer system or files until a sum of money is paid. Ransomware may encrypt your personal files so that...

Is It Possible To Get A Virus Just From Visiting A Website?

Is It Possible To Get A Virus Just From Visiting A Website?

Difficulty: Easy

In a modern and up-to-date web browser and operating system, it is unlikely that your computer will catch a virus just by visiting a website in a web browser.

What Is A MITM Attack

What Is A MITM Attack?

Difficulty: Medium

Stands for a man-in-the-middle attack. A MITM attack is a type of cyberattack where an attacker intercepts communications between the user and server...

What Is A Computer Virus

What Is A Computer Virus?

Difficulty: Easy

A computer virus is a type of malicious program, script, code, or macro that is designed to harm a computer and spread from one device to another...