scam - a deceptive scheme or trick used to cheat someone out of something, especially money., worm - a self-replicating program able to spread itself across a network, typically having a detrimental effect., malware - software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system., phishing - the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers., vishing - the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers., smishing - the fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers., virus - a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data., trojan - a program downloaded and installed on a computer that appears harmless, but is malicious., spyware - software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive., ransomware - a type of malicious software designed to block access to a computer system until a sum of money is paid., fraud - wrongful or criminal deception intended to result in financial or personal gain., RATs - software that gives a person full control a tech device, remotely, to give the user access to your system, cybercriminal - a person who engages in criminal activity by means of computers or the internet., cybercrime - criminal activities carried out by means of computers or the internet., hack - to gain unauthorized access to data in a system., cybersecurity - the state of being protected against the criminal or unauthorized use of electronic data,,
0%
Cybersecurity
Sdílet
Sdílet
Sdílet
podle
Tammybiickert
Upravit obsah
Tisk
Vložit
Více
Přiřazení
Výsledková tabule/Žebříček
Zobrazit více
Zobrazit méně
Tento žebříček je v současné době soukromý. Klikněte na
Share
chcete-li jej zveřejnit.
Tuto výsledkovou tabuli vypnul majitel zdroje.
Tento žebříček je zakázán, protože vaše možnosti jsou jiné než možnosti vlastníka zdroje.
Možnosti vrácení
Spojte odpovídající
je otevřená šablona. Negeneruje skóre pro žebříček.
Vyžaduje se přihlášení.
Vizuální styl
Fonty
Je vyžadováno předplatné
Možnosti
Přepnout šablonu
Zobrazit vše
Při přehrávání aktivity se zobrazí další formáty.
Otevřené výsledky
Kopírovat odkaz
QR kód
Odstranit
Obnovit automatické uložení:
?