Please enable JavaScript.
Coggle requires JavaScript to display documents.
Unit 8 (part 2) - Coggle Diagram
Unit 8 (part 2)
SMISHING
-
-
-
-
call. If they do, they will be asked to supply personal details such as crediy'debit
card numbers or passwords. As with phishing attacl<s, the text message will appear
to come from a legitimate source and will make a claim, for example, that they
-
-
-
how do they do it?
Malicious use refers to, for example, deletion, fraud, identity theft and selling on
-
-
-
-
wasn't made by you, please fill out the following form to cancel your order in the
next 24 hours' is given. The form will ask for details such as credit card number,
user's address and so on. Some of the key clues are that links, such as how to
'contact us', don't work.
VISHING
-
-
message . As with all phishing attacks, the user will be askecl to supply pcrsonal
-
-
HACKING
-
effects
-
-
. Data can be deleted, changed or
-
-
PHISHING
what is it?
-
-
on a link in the email or attachment, they are
-
-
-
trusted source, such as a bank or well-known
-
effects
-
data, such as bank account data or credit
card numbers, from the user
-
prevention
-
-
-
-
-
end in .exe, .bat, .com or .php, for example
PHARMING
What is it?
-
-
-
-
any action, unlike phishing)
-
-
sequrity of data
There are a number of security risks associated with any electronic device that connects to a network (internet or mobile phone networks being the most comman)
-