Malware - Software designed to infiltrate, damage, or disrupt computer systems and networks. Types of malware include viruses, worms, trojans, ransomware, spyware, and adware., Phishing - A fraudulent attempt to obtain sensitive information (such as usernames, passwords, and credit card details) by disguising oneself as a trustworthy entity in electronic communications, often via email., DDoS (Distributed Denial of Service) Attack - An attack where the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other., SQL Injection - A code injection technique used to attack data-driven applications by inserting malicious SQL statements into an entry field, allowing the attacker to manipulate the database., Brute Force Attack - An attack that involves systematically trying all possible combinations of passwords or encryption keys until the correct one is found., Zero-Day Exploit - An exploit that takes advantage of a previously unknown vulnerability in software or hardware before the developer has had a chance to release a patch or fix., Ransomware - A type of malware that encrypts the victim's data and demands a ransom payment in exchange for the decryption key., Spyware - Software that secretly collects information about a user's activities without their knowledge, often for advertising purposes or to steal personal data., Adware - Software that automatically displays or downloads advertising material (often unwanted) when a user is online, sometimes bundled with free software., Social Engineering - A manipulation technique that exploits human error to gain private information, access, or valuables. Common methods include pretexting, baiting, and tailgating., Packet Sniffing - The practice of intercepting and logging traffic that passes over a computer network, which can be used by attackers to capture sensitive information like passwords and email content., Botnet - A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, often used to send spam or launch DDoS attacks., Keylogging - The use of a program to record every keystroke made by a computer user, typically to gain fraudulent access to passwords and other confidential information., Virus - a type of malware that attaches itself to a legitimate program or file and spreads to other programs and files when the infected program or file is executed., Trojan Horse - a type of malware that disguises itself as a legitimate software or file to trick users into downloading and installing it., Worm - a type of malware that can replicate itself and spread independently to other computers over a network. ,
0%
Threats to computer networks
Sdílet
Sdílet
Sdílet
podle
Mgoodman4
Upravit obsah
Tisk
Vložit
Více
Přiřazení
Výsledková tabule/Žebříček
Zobrazit více
Zobrazit méně
Tento žebříček je v současné době soukromý. Klikněte na
Share
chcete-li jej zveřejnit.
Tuto výsledkovou tabuli vypnul majitel zdroje.
Tento žebříček je zakázán, protože vaše možnosti jsou jiné než možnosti vlastníka zdroje.
Možnosti vrácení
Spojte odpovídající
je otevřená šablona. Negeneruje skóre pro žebříček.
Vyžaduje se přihlášení.
Vizuální styl
Fonty
Je vyžadováno předplatné
Možnosti
Přepnout šablonu
Zobrazit vše
Při přehrávání aktivity se zobrazí další formáty.
Otevřené výsledky
Kopírovat odkaz
QR kód
Odstranit
Obnovit automatické uložení:
?