Malware - Software designed to infiltrate, damage, or disrupt computer systems and networks. Types of malware include viruses, worms, trojans, ransomware, spyware, and adware., Phishing - A fraudulent attempt to obtain sensitive information (such as usernames, passwords, and credit card details) by disguising oneself as a trustworthy entity in electronic communications, often via email., DDoS (Distributed Denial of Service) Attack - An attack where the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other., SQL Injection - A code injection technique used to attack data-driven applications by inserting malicious SQL statements into an entry field, allowing the attacker to manipulate the database., Brute Force Attack - An attack that involves systematically trying all possible combinations of passwords or encryption keys until the correct one is found., Zero-Day Exploit - An exploit that takes advantage of a previously unknown vulnerability in software or hardware before the developer has had a chance to release a patch or fix., Ransomware - A type of malware that encrypts the victim's data and demands a ransom payment in exchange for the decryption key., Spyware - Software that secretly collects information about a user's activities without their knowledge, often for advertising purposes or to steal personal data., Adware - Software that automatically displays or downloads advertising material (often unwanted) when a user is online, sometimes bundled with free software., Social Engineering - A manipulation technique that exploits human error to gain private information, access, or valuables. Common methods include pretexting, baiting, and tailgating., Packet Sniffing - The practice of intercepting and logging traffic that passes over a computer network, which can be used by attackers to capture sensitive information like passwords and email content., Botnet - A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, often used to send spam or launch DDoS attacks., Keylogging - The use of a program to record every keystroke made by a computer user, typically to gain fraudulent access to passwords and other confidential information., Virus - a type of malware that attaches itself to a legitimate program or file and spreads to other programs and files when the infected program or file is executed., Trojan Horse - a type of malware that disguises itself as a legitimate software or file to trick users into downloading and installing it., Worm - a type of malware that can replicate itself and spread independently to other computers over a network. ,
0%
Threats to computer networks
مشاركة
مشاركة
مشاركة
بواسطة
Mgoodman4
تحرير المحتوى
طباعة
تضمين
المزيد
الواجبات
لوحة الصدارة
عرض المزيد
عرض أقل
لوحة الصدارة هذه في الوضع الخاص حاليًا. انقر على
مشاركة
لتجعلها عامة.
عَطَل مالك المورد لوحة الصدارة هذه.
عُطِلت لوحة الصدارة هذه حيث أنّ الخيارات الخاصة بك مختلفة عن مالك المورد.
خيارات الإرجاع
المطابقة
قالب مفتوح النهاية. ولا يصدر عنه درجات توضع في لوحة الصدارة.
يجب تسجيل الدخول
النمط البصري
الخطوط
يجب الاشتراك
الخيارات
تبديل القالب
إظهار الكل
ستظهر لك المزيد من التنسيقات عند تشغيل النشاط.
فتح النتائج
نسخ الرابط
رمز الاستجابة السريعة
حذف
استعادة الحفظ التلقائي:
؟