Please enable JavaScript.
Coggle requires JavaScript to display documents.
IT Security Threats (Spoofing (Spoofing IP address to hide a hacker…
IT Security Threats
Spoofing
Spoofing IP address to hide a hacker identity
Spoofing a MAC address in a ARP cache
Spoofing a proxy server in a man in the middle attack
Spoofing email addresses in a phishing attack
Intimidating something that it's not
Virus
Zero day virus
A virus that has never been detected before
Will get through if never detected before
Malicious code or programme
alter a way a computer operates
Commonly used in a link or attached to another programme
Used to damage machines
Key Logging
A software or hardware designed to record a person's keystroke on a keyboard
People are unaware of this happening to them
Often used to steal financial data
Passwords are found using key logging
Ransomeware
A type of malware that prevents people from accessing personal files
Demands a ransom payment in order for user to access their files again
Can be found in email spams
Can be found in malvertising