Data - Raw facts and figures, Information - Created when data has been processed and becomes meaningful, Social Engineering - A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes., Shouldering - Involves the attacker watching the victim while they provide sensitive information such as password or PIN., Name generator attack - The victim is asked in app or a social media post to combine a few pieces of information or complete a short quiz to produce a name. Attackers do this to find out key pieces of information that can help them to answer the security questions that protect people’s accounts., Phishing - An attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data., Blagging - An attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money., Hacking Hacking Hacking  - Gaining unauthorised access to or control of a computer system.,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?