Please enable JavaScript.
Coggle requires JavaScript to display documents.
Threats ⚠️❗ (Phisihng (phishing is the fraudulent activity of sending…
Threats ⚠️❗
Phisihng
phishing is the fraudulent activity of sending fraud emails to individuals to phish information from them
-
-
Poor network policy
A poor network policy allows everyone on the network to do things that are harmful to the network but not stated on the network policy without getting introuble
A poor network policy is prevent by setting up a detail and specific network policy to prevent people from misusing the network
-
Malaware
software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system
-
-
Social engineering
-
Social engineering, in the context of information security, is the psychological manipulation of people into performing actions or divulging confidential information
social engineering can be prevented by using passwords and properly checking your surroundings and not giving away sensitive data:
SQL injection
-
SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution
-
-
-