Snooping - Attempting to secretively discover private information about a person, company, or other entity., Wiretapping - A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network., Social Engineering - The use of deception to gain personal and/or private information for unlawful purposes., Reconnaissance - The passive gathering of information about a potential victim., Pretexting - Tricking a victim into revealing sensitive information under false pretenses., Email Attack - Exploiting a victim using email messages., Browser Attack - Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer., Man-in-the-Middle Attack - An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other., Replay Attack - An attempt to connect to a server by capturing and resending authentication information., Impersonation - TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim., Denial of Service - An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients., Malware - An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information., Identify Theft - An occurrence in which thieves steal other people's personal and financial information for their own personal gain.,
0%
Cybersecurity - Confidentiality (CIA)
共用
由
Msalvas
編輯內容
嵌入
更多
作業
排行榜
顯示更多
顯示更少
此排行榜當前是私有的。單擊
共用
使其公開。
資源擁有者已禁用此排行榜。
此排行榜被禁用,因為您的選項與資源擁有者不同。
還原選項
匹配遊戲
是一個開放式範本。它不會為排行榜生成分數。
需要登錄
視覺風格
字體
需要訂閱
選項
切換範本
顯示所有
播放活動時將顯示更多格式。
打開結果
複製連結
QR 代碼
刪除
恢復自動保存:
?