More cards in this set

Card 6

Front

What is a trojans

Back

Preview of the front of card 6

Card 7

Front

What is spywre

Back

Preview of the front of card 7

Card 8

Front

What is adware

Back

Preview of the front of card 8

Card 9

Front

What is social engineering

Back

Preview of the front of card 9

Card 10

Front

What is pharming

Back

Preview of the front of card 10

Card 11

Front

What is phishing

Back

Preview of the front of card 11

Card 12

Front

What is shouldering

Back

Preview of the front of card 12

Card 13

Front

What is blagging

Back

Preview of the front of card 13

Card 14

Front

How can networks be protected against threats(5)

Back

Preview of the front of card 14

Card 15

Front

Methods of authentication (4)

Back

Preview of the front of card 15