scam - a deceptive scheme or trick used to cheat someone out of something, especially money., worm - a self-replicating program able to spread itself across a network, typically having a detrimental effect., malware - software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system., phishing - the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers., vishing - the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers., smishing - the fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers., virus - a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data., trojan - a program downloaded and installed on a computer that appears harmless, but is malicious., spyware - software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive., ransomware - a type of malicious software designed to block access to a computer system until a sum of money is paid., fraud - wrongful or criminal deception intended to result in financial or personal gain., RATs - software that gives a person full control a tech device, remotely, to give the user access to your system, cybercriminal - a person who engages in criminal activity by means of computers or the internet., cybercrime - criminal activities carried out by means of computers or the internet., hack - to gain unauthorized access to data in a system., cybersecurity - the state of being protected against the criminal or unauthorized use of electronic data,,
0%
Cybersecurity
مشاركة
مشاركة
مشاركة
بواسطة
Tammybiickert
تحرير المحتوى
طباعة
تضمين
المزيد
الواجبات
لوحة الصدارة
عرض المزيد
عرض أقل
لوحة الصدارة هذه في الوضع الخاص حاليًا. انقر على
مشاركة
لتجعلها عامة.
عَطَل مالك المورد لوحة الصدارة هذه.
عُطِلت لوحة الصدارة هذه حيث أنّ الخيارات الخاصة بك مختلفة عن مالك المورد.
خيارات الإرجاع
المطابقة
قالب مفتوح النهاية. ولا يصدر عنه درجات توضع في لوحة الصدارة.
يجب تسجيل الدخول
النمط البصري
الخطوط
يجب الاشتراك
الخيارات
تبديل القالب
إظهار الكل
ستظهر لك المزيد من التنسيقات عند تشغيل النشاط.
فتح النتائج
نسخ الرابط
رمز الاستجابة السريعة
حذف
استعادة الحفظ التلقائي:
؟