Reconnaissance - Finding out information to use in a cyber attack, Malware - Dangerous software, Phishing - Attempt to trick you into giving over information via phone or emails, Vulnerability - A security flaw in a computer, Cyber Kill Chain - The process of planning and executing a cyber attack, Identity Theft - Using someone else's details to impersonate them,

Ledertavle

Visuell stil

Alternativer

Bytt mal

Gjenopprett automatisk lagring: ?