Vulnerability - a flaw or weakness in a system or software that attackers can exploit., Malware - malicious software designed to gain unauthorised access to a computer system and cause damage or steal data., Social Engineering - an attack that uses psychological manipulation to get victims to disclose confidential information or take other actions., Phishing - cyber attack that uses social engineering techniques to steal sensitive information such as passwords, credit card numbers, and banking details., Spear Phishing - a phishing attack in which an attacker targets a specific individual or organization., Whaling - a phishing in which an attacker tergets high-level individuals such as CEOs, CFOs, and other executives., Identity Theft - stealing someone's personal information to gain access to their financial accounts or other sensitive information., Botnet - network of computers infected with malicious software that can be used to launch distributed denial-of-services (DDoS) attacks., Denial-of Service (DoS) - a type of cyber attack that attempts to make a computer or network resource unavailable to its intended users., Distibuted Denial-of Service (DDoS) - attack when mutliple systems flood a targeted system with traffic to overwhelm it and prevent legitimate users from accessing it. ,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?