Trojan - Disguised as legitimate software these run in the background once a file or software is run or opened., Virus - Malicious code that runs when the file is executed, requires human intervention to run., Worm - A type of virus that is programmed to replicate and spread across networks taking advantage of exploits., Ransomware - Encrypts files, data and more until the victim/target has paid the attacker., Adware - Software which displays and clutters the interface with unwanted advertising sometimes leading to malicious sites., Spyware - Secretly monitors and collects data on user actions while sending the data to the attacker., Denial of Service - Overwhelms a target with traffic to prevent users from accessing it., Brute Force - A hacking method in which password combinations are tried repeatedly to gain access., Phishing - The use of deceptive emails to trick victims into revealing sensitive information, make payments and more., Pharming - The use of fake websites to gather sensitive information such as financial details or login credentials., Spear Phishing - A targeted effort against an individual to get them to leak information., Man in the Middle Attack - Where an attacker intercepts data in transit potentially modifying it or spying on it., Zero Day Exploit - Taking advantage of vulnerabilities which have yet to have been patched., Key Logger - A specific form of spyware which records keyboard inputs to capture sensitive information., Rootkit - Grants the attacker remote access to a device once installed., SQL Injection - Exploits vulnerabilities in applications to delete or manipulate data within databases., Baiting - Tricking victims into installing malware through false promises or rewards., Piggybacking - Using a legitimate users credentials to gain unauthorised access to systems, data and more., Shoulder Surfing - Physically observing someone's use of a device to gather login credentials or sensitive information.,
0%
Cybersecurity Threats
Share
Share
Share
by
Simonbates
KS5
Adult education
Workplace
Computing
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Find the match
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?