Data Interception and Theft - Sensitive information travelling on a network is intercepted using monitoring hardware and software like packet sniffers., Brute-Force Attack - Automated software is used to try millions of potential passwords until one works., Denial of Service (DOS) - Hacker prevents users from accessing a network or website by flooding it with useless traffic requests., SQL Injection - SQL code is typed into input boxes on a website. If the site doesn't have strong input validation, the hacker can gain access to databases behind the website, e.g. databases of customer details., Malware - Malicious software designed to damage or disrupt a device or network., Spyware - Monitors user actions and sends information to the hacker., Scareware - Tricks users into paying to fix fake problems., Ransomware - Encrypts files. User pays for decryption key., Rootkit - Gives hackers admin access to the system., Viruses - Attached to the other files. Only run or replicate when the file is opened., Worms - Like viruses, but self-replicate so spread quickly., Trojan Horse - Malware disguised as legitimate software. Do not replicate themselves.,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?