ICT revision 0.0 / 5 ? ICTnetwork threatsSocial engineeringAll LevelsAll boards Created by: RjarmanCreated on: 29-06-18 11:43 5643217 Across 1. Gaining confidential information by looking over someones shoulder (11) 6. Malware that disguises itself as a genuine site (11) 7. a form of fraud from which someone (the attacker) “masquerades” as a well know (reputable) person or company in an email (8) Down 2. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. (7) 3. Malware that lock your computer and demands money for its release (10) 4. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. (7) 5. Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures (6, 11)
Comments
No comments have yet been made