Spyware and Key loggers - Malware: Software that hides on your computer recording your keystrokes to send back to a third parties for analysis, Data interception and Theft - (Un-encrypted) Data may be intercepted during transmission, but physical theft can occur where storage devices or data files are left insecurely, Shouldering  - (Primitive SE) Looking over someone's shoulder when they enter a password or PIN, Blagging - Dishonestly persuading someone to divulge personal or sensitive information by deception, Brute Force Attacks - Hacking: Automated or manual attempts to gain unauthorised access to secure areas by trying all possible password or key combinations, Phising - (SE) Phishing emails redirect a user to a fake website where they trick the reader into divulging confidential information such as passwords that can be used fraudulently, DoS Attacks  - Denial of Service Attacks occurs when servers and devices are flooded with too many requests or packets, causing them to crash or become unstable., Viruses - Malware: A virus is a program that is installed on your computer which is designed to replicate itself. Viruses cause harm to files and spread to other computers and devices. Needs a triggering event like running a script or executable files (e.g. Word Document) Word do., Worms - Malware: Stand alone malicious programs that can self-replicate and propagate independently as soon as they have breached the system - they do not require activation - or any human intervention - to execute and spread their code, Trojan Horse Emails (Trojan) - Often from a inconspicuous file attachment from an email (maybe disguised as one of your contacts) or a free program. This malicious code or software is downloaded and installed on the hosts computer, infecting files and causing damage to the users (OS) system. ,

Cyber Security and Social Engineering (SE) Quiz

Табло

Обръщане на плочки е отворен шаблон. Тя не генерира резултати за табло.

Визуален стил

Опции

Шаблон за превключване

Възстановяване на авто-записаната: ?