Malware - Software designed to infiltrate, damage, or disrupt computer systems and networks. Types of malware include viruses, worms, trojans, ransomware, spyware, and adware., Phishing - A fraudulent attempt to obtain sensitive information (such as usernames, passwords, and credit card details) by disguising oneself as a trustworthy entity in electronic communications, often via email., DDoS (Distributed Denial of Service) Attack - An attack where the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other., SQL Injection - A code injection technique used to attack data-driven applications by inserting malicious SQL statements into an entry field, allowing the attacker to manipulate the database., Brute Force Attack - An attack that involves systematically trying all possible combinations of passwords or encryption keys until the correct one is found., Zero-Day Exploit - An exploit that takes advantage of a previously unknown vulnerability in software or hardware before the developer has had a chance to release a patch or fix., Ransomware - A type of malware that encrypts the victim's data and demands a ransom payment in exchange for the decryption key., Spyware - Software that secretly collects information about a user's activities without their knowledge, often for advertising purposes or to steal personal data., Adware - Software that automatically displays or downloads advertising material (often unwanted) when a user is online, sometimes bundled with free software., Social Engineering - A manipulation technique that exploits human error to gain private information, access, or valuables. Common methods include pretexting, baiting, and tailgating., Packet Sniffing - The practice of intercepting and logging traffic that passes over a computer network, which can be used by attackers to capture sensitive information like passwords and email content., Botnet - A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, often used to send spam or launch DDoS attacks., Keylogging - The use of a program to record every keystroke made by a computer user, typically to gain fraudulent access to passwords and other confidential information., Virus - a type of malware that attaches itself to a legitimate program or file and spreads to other programs and files when the infected program or file is executed., Trojan Horse - a type of malware that disguises itself as a legitimate software or file to trick users into downloading and installing it., Worm - a type of malware that can replicate itself and spread independently to other computers over a network. ,
0%
Threats to computer networks
Share
Share
Share
by
Mgoodman4
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?