Snooping - Attempting to secretively discover private information about a person, company, or other entity., Wiretapping - A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network., Social Engineering - The use of deception to gain personal and/or private information for unlawful purposes., Reconnaissance - The passive gathering of information about a potential victim., Pretexting - Tricking a victim into revealing sensitive information under false pretenses., Email Attack - Exploiting a victim using email messages., Browser Attack - Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer., Man-in-the-Middle Attack - An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other., Replay Attack - An attempt to connect to a server by capturing and resending authentication information., Impersonation - TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim., Denial of Service - An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients., Malware - An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information., Identify Theft - An occurrence in which thieves steal other people's personal and financial information for their own personal gain.,

Cybersecurity - Confidentiality (CIA)

Rangliste

Visuel stil

Indstillinger

Skift skabelon

Gendan automatisk gemt: ?