Phishing - It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message., Blagging - attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money, Brute force attack - This is a form of attack that makes multiple attempts to discover something (such as a password), Malware - Malware (malicious software) is software that is designed to gain access to your computer with malicious intent., Worms - Replicate themselves but do not attach themselves to files as a virus does, Ransomware - Locks a computer, encrypts files, and therefore prevents the user from being able to access the data., Trojans - Open a ‘back door’ to give an attacker remote access to your computer, Spyware - Unwanted software that monitors and gathers information on a person and how they use their computer, Adware - It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online., Internet bots - Automated programs that perform tasks repeatedly,

Tabela rankingowa

Motyw

Opcje

Zmień szablon

Przywrócić automatycznie zapisane ćwiczenie: ?