Denial of Service (DoS) - An attack that involved directing a massive amount of web traffic to a website. This results in these websites/services not being able to cope with the amount of traffic, and then go down, becoming unavailable, Phishing - The fraudulent practice of sending emails, purporting to be from reputable companies in order to induce individuals to reveal personal information (such as passwords and credit card numbers, DOBs, address details), to click on links to malware infected websites, or download a virus-infected file., Adware - Software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online., Zero-Day Vulnerability - Can be exploited by hacker/cyber criminals as there is no know fix/patch available, Ransomware - A form of malware that's designed to take money from it's victims by infecting a system and demanding payment for any files to be released or systems to be up and running again, Insider Threat - Actions by a member of the organisation that could result in malicious activity and a security incident being raised, Trojan - A type of malware that downloads onto a computer disguised as a legitimate program, Spyware - A kind of malware that secretly gathers information about a person or organization and relays this data to other parties., Supply Chain Attack - Weaknesses in our suppliers/vendors practices that allow a cyber criminal/hacker to access an organisations systems., Social Engineering - Used by cyber criminals to manipulate someone, either personally or in an organisation, to share information that could be used negatively, such as to make financial gain. It is also used to obtain sensitive information.,
0%
Identify Security Threats
مشاركة
مشاركة
مشاركة
بواسطة
Lmonaghan
Workplace
عرض المزيد
تحرير المحتوى
تضمين
المزيد
لوحة الصدارة
عرض المزيد
عرض أقل
لوحة الصدارة هذه في الوضع الخاص حاليًا. انقر على
مشاركة
لتجعلها عامة.
عَطَل مالك المورد لوحة الصدارة هذه.
عُطِلت لوحة الصدارة هذه حيث أنّ الخيارات الخاصة بك مختلفة عن مالك المورد.
خيارات الإرجاع
المطابقة
قالب مفتوح النهاية. ولا يصدر عنه درجات توضع في لوحة الصدارة.
يجب تسجيل الدخول
النمط البصري
الخطوط
يجب تسجيل الدخول
الخيارات
تبديل القالب
إظهار الكل
ستظهر لك المزيد من التنسيقات عند تشغيل النشاط.
استعادة الحفظ التلقائي:
؟