Please enable JavaScript.
Coggle requires JavaScript to display documents.
4.1.1 Threats - Coggle Diagram
4.1.1 Threats
-
-
-
-
-
Trojan Horse
They give full control of an infected PC to another PC by disguising themselves as a ligitimate software.
-
Rootkit
Remotely access a computer to steal data, gain control or spy without being detected.
-
-
Spyware
Collects data on user activity, e.g. credentials, without user's knowledge.
-
Botnet
A network of bot-infected computers controlled by a central hacker. They are used to conduct DDoS attacks.