Software that is designed to disrupt or harm a user`s computer
1 of 10
Phishing
Sending emails pretending to be a reputable company to try to gain people`s personal information
2 of 10
Spear Phishing
Targeted contextualized Phishing
3 of 10
Smishing
Phishing via text message
4 of 10
Social Engineering
Tricking people into breaking security procedures to break into a network
5 of 10
Brute Force Attack
This hacking is where they throw everything at it. They try every possibility to crack the details and when they do they win
6 of 10
Denial-of-Service(DoS)
This type is designed to flood a network with useless network traffic. This is often a threat that is carried out on a web server to 'take down' a website
7 of 10
Data interception and theft
This is where data packets are monitored that are travelling to look for packets that contain personal data
8 of 10
SQL injection
SQL is used to search through a database looking for information
9 of 10
Poor Network Policy
A network may be under threat if an organisation has a poor network policy. If an organisation does not regally test their network for security issues and loopholes, they may find one can be exploited before it is found.
10 of 10
Other cards in this set
Card 2
Front
Sending emails pretending to be a reputable company to try to gain people`s personal information
Back
Phishing
Card 3
Front
Targeted contextualized Phishing
Back
Card 4
Front
Phishing via text message
Back
Card 5
Front
Tricking people into breaking security procedures to break into a network
Comments
No comments have yet been made