scam - a deceptive scheme or trick used to cheat someone out of something, especially money., worm - a self-replicating program able to spread itself across a network, typically having a detrimental effect., malware - software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system., phishing - the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers., vishing - the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers., smishing - the fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers., virus - a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data., trojan - a program downloaded and installed on a computer that appears harmless, but is malicious., spyware - software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive., ransomware - a type of malicious software designed to block access to a computer system until a sum of money is paid., fraud - wrongful or criminal deception intended to result in financial or personal gain., RATs - software that gives a person full control a tech device, remotely, to give the user access to your system, cybercriminal - a person who engages in criminal activity by means of computers or the internet., cybercrime - criminal activities carried out by means of computers or the internet., hack - to gain unauthorized access to data in a system., cybersecurity - the state of being protected against the criminal or unauthorized use of electronic data,,
0%
Cybersecurity
Teilen
Teilen
Teilen
von
Tammybiickert
Inhalt bearbeiten
Drucken
Einbetten
Mehr
Zuweisungen
Bestenliste
Mehr anzeigen
Weniger anzeigen
Diese Bestenliste ist derzeit privat. Klicke auf
Teilen
um sie öffentlich zu machen.
Diese Bestenliste wurde vom Eigentümer der Ressource deaktiviert.
Diese Bestenliste ist deaktiviert, da sich Ihre Einstellungen von denen des Eigentümer der Ressource unterscheiden.
Einstellungen zurücksetzen
It's a Match
ist eine Vorlage mit offenem Ende. Es generiert keine Punkte für eine Bestenliste.
Anmelden erforderlich
Visueller Stil
Schriftarten
Abonnement erforderlich
Einstellungen
Vorlage ändern
Alle anzeigen
Weitere Formate werden angezeigt, wenn du die Aktivität spielst.
Offene Ergebnisse
Link kopieren
QR-Code
Löschen
Soll die automatisch gespeicherte Aktivität
wiederhergestellt werden?