Virus - This is a piece of code designed to copy itself into other programs and files. Many of them will attempt to corrupt, modify or delete data on your computer. Email attachment or by simply clicking on a web link., Trojan - Hides inside a legitimate software application, completely unnoticed., Keyloggers - A computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information., Spyware - Malware used for stealing your internet usage data and sensitive information., Distributed Denial of Service attack (DDOS) - A method where cybercriminals flood a network with so much traffic that it cannot operate or communicate as it normally would., Zombie PC - This is a compromised computer under the control of an attacker who often controls many other compromised machines that together make up a botnet. The computer’s owner is often not aware that his or her computer is being used for malicious activities., Botnet - This is a number of Internet-connected devices, each of which is running one or more bots. The hacker then will trigger all the bots to send email spam or ping a web server millions of times so that it becomes overloaded with traffic and will make the server grind to a halt!, Phishing - Cybercrime in which you are contacted by email, telephone or text message by someone posing as a legitimate institution to trick you into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords., Ransomware - Malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again., Pharming - Cyberattack intended to redirect a website's traffic to a fake site., Firewall - to prevent unauthorised access to a network., Encryption - to prevent data being intercepted across an internet connection. Use a VPN if on an Open Wi-Fi connection., Biometric security - Fingerprint mapping, facial recognition, and retina scans are all examples of this, Social Engineering - The term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.,
0%
Cybersecurity
Μοιραστείτε
Μοιραστείτε
Μοιραστείτε
από
Missallgar
Secondary
Y9
Y10
Computing
Επεξεργασία περιεχομένου
Εκτύπωση
Ενσωμάτωση
Περισσότερα
Αναθέσεις
Κατάταξη
Εμφάνιση περισσότερων
Εμφάνιση λιγότερων
Ο πίνακας κατάταξης είναι ιδιωτικός. Κάντε κλικ στην επιλογή
Μοιραστείτε
για να τον δημοσιοποιήσετε.
Ο πίνακας κατάταξης έχει απενεργοποιηθεί από τον κάτοχό του.
Ο πίνακας κατάταξης είναι απενεργοποιημένος, καθώς οι επιλογές σας είναι διαφορετικές από τον κάτοχό του.
Επαναφορά επιλογών
Αντιστοίχιση
είναι ένα ανοικτό πρότυπο. Δεν δημιουργεί βαθμολογίες πίνακα κατάταξης.
Απαιτείται σύνδεση
Οπτικό στυλ
Γραμματοσειρές
Απαιτείται συνδρομή
Επιλογές
Αλλαγή προτύπου
Εμφάνιση όλων
Θα εμφανιστούν περισσότερες μορφές καθώς παίζετε τη δραστηριότητα.
Ανοιχτά αποτελέσματα
Αντιγραφή συνδέσμου
Κωδικός QR
Διαγραφή
Επαναφορά αυτόματα αποθηκευμένου:
;