Malware - Software designed to infiltrate, damage, or disrupt computer systems and networks. Types of malware include viruses, worms, trojans, ransomware, spyware, and adware., Phishing - A fraudulent attempt to obtain sensitive information (such as usernames, passwords, and credit card details) by disguising oneself as a trustworthy entity in electronic communications, often via email., DDoS (Distributed Denial of Service) Attack - An attack where the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other., SQL Injection - A code injection technique used to attack data-driven applications by inserting malicious SQL statements into an entry field, allowing the attacker to manipulate the database., Brute Force Attack - An attack that involves systematically trying all possible combinations of passwords or encryption keys until the correct one is found., Zero-Day Exploit - An exploit that takes advantage of a previously unknown vulnerability in software or hardware before the developer has had a chance to release a patch or fix., Ransomware - A type of malware that encrypts the victim's data and demands a ransom payment in exchange for the decryption key., Spyware - Software that secretly collects information about a user's activities without their knowledge, often for advertising purposes or to steal personal data., Adware - Software that automatically displays or downloads advertising material (often unwanted) when a user is online, sometimes bundled with free software., Social Engineering - A manipulation technique that exploits human error to gain private information, access, or valuables. Common methods include pretexting, baiting, and tailgating., Packet Sniffing - The practice of intercepting and logging traffic that passes over a computer network, which can be used by attackers to capture sensitive information like passwords and email content., Botnet - A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, often used to send spam or launch DDoS attacks., Keylogging - The use of a program to record every keystroke made by a computer user, typically to gain fraudulent access to passwords and other confidential information., Virus - a type of malware that attaches itself to a legitimate program or file and spreads to other programs and files when the infected program or file is executed., Trojan Horse - a type of malware that disguises itself as a legitimate software or file to trick users into downloading and installing it., Worm - a type of malware that can replicate itself and spread independently to other computers over a network. ,
0%
Threats to computer networks
Paylaş
Paylaş
Paylaş
Mgoodman4
tarafından
İçeriği Düzenle
Yazdır
Yerleştir
Daha fazla
Ödevler
Skor Tablosu
Daha fazla göster
Daha az göster
Bu lider panosu şu anda gizlidir. Herkese açmak için
Paylaş
'a tıklayın.
Bu lider panosu kaynak sahibi tarafından devre dışı bırakıldı.
Seçenekleriniz kaynak sahibinden farklı olduğu için bu lider panosu devre dışı bırakıldı.
Seçenekleri Eski Haline Döndür
Eşleştir
açık uçlu bir şablondur. Bir lider panosu için skor oluşturmaz.
Giriş gereklidir
Görsel stil
Yazı tipleri
Abonelik gerekli
Seçenekler
Şablonu değiştir
Tümünü göster
Siz etkinliği oynarken daha fazla format görüntülenir.
Sonuçları aç
Bağlantıyı kopyala
QR kodu
Sil
Otomatik olarak kaydedilen geri yüklensin mi:
?