Malware - Software designed to infiltrate, damage, or disrupt computer systems and networks. Types of malware include viruses, worms, trojans, ransomware, spyware, and adware., Phishing - A fraudulent attempt to obtain sensitive information (such as usernames, passwords, and credit card details) by disguising oneself as a trustworthy entity in electronic communications, often via email., DDoS (Distributed Denial of Service) Attack - An attack where the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other., SQL Injection - A code injection technique used to attack data-driven applications by inserting malicious SQL statements into an entry field, allowing the attacker to manipulate the database., Brute Force Attack - An attack that involves systematically trying all possible combinations of passwords or encryption keys until the correct one is found., Zero-Day Exploit - An exploit that takes advantage of a previously unknown vulnerability in software or hardware before the developer has had a chance to release a patch or fix., Ransomware - A type of malware that encrypts the victim's data and demands a ransom payment in exchange for the decryption key., Spyware - Software that secretly collects information about a user's activities without their knowledge, often for advertising purposes or to steal personal data., Adware - Software that automatically displays or downloads advertising material (often unwanted) when a user is online, sometimes bundled with free software., Social Engineering - A manipulation technique that exploits human error to gain private information, access, or valuables. Common methods include pretexting, baiting, and tailgating., Packet Sniffing - The practice of intercepting and logging traffic that passes over a computer network, which can be used by attackers to capture sensitive information like passwords and email content., Botnet - A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, often used to send spam or launch DDoS attacks., Keylogging - The use of a program to record every keystroke made by a computer user, typically to gain fraudulent access to passwords and other confidential information., Virus - a type of malware that attaches itself to a legitimate program or file and spreads to other programs and files when the infected program or file is executed., Trojan Horse - a type of malware that disguises itself as a legitimate software or file to trick users into downloading and installing it., Worm - a type of malware that can replicate itself and spread independently to other computers over a network. ,
0%
Threats to computer networks
Condividi
Condividi
Condividi
di
Mgoodman4
Modifica contenuto
Stampa
Incorpora
Altro
Compiti
Classifica
Mostra di più
Mostra meno
Questa classifica è privata. Fai clic su
Condividi
per renderla pubblica.
Questa classifica è stata disattivata dal proprietario della risorsa.
Questa classifica è disattivata perché le impostazioni sono diverse da quelle del proprietario della risorsa.
Ripristina le opzioni
Abbinamenti
è un modello a risposta aperta. Non genera punteggi validi per una classifica.
Login necessario
Stile di visualizzazione
Tipi di caratteri
Abbonamento richiesto
Opzioni
Cambia modello
Mostra tutto
Mentre esegui l'attività appariranno altri formati.
Apri risultati
Copia link
Codice QR
Elimina
Ripristinare il titolo salvato automaticamente:
?