More cards in this set

Card 6

Front

social engineering

Back

Preview of the front of card 6

Card 7

Front

types of attack

Back

Preview of the front of card 7

Card 8

Front

packet sniffing

Back

Preview of the front of card 8

Card 9

Front

how can packet sniffing be used for black hat

Back

Preview of the front of card 9

Card 10

Front

SQL injection is

Back

Preview of the front of card 10

Card 11

Front

SQL injection can be prevented by

Back

Preview of the front of card 11

Card 12

Front

white hat hacker

Back

Preview of the front of card 12

Card 13

Front

black hat hacker

Back

Preview of the front of card 13

Card 14

Front

brown hat hacker

Back

Preview of the front of card 14

Card 15

Front

network forensics

Back

Preview of the front of card 15
View more cards