Please enable JavaScript.
Coggle requires JavaScript to display documents.
threats Justin Wu - Coggle Diagram
threats Justin Wu
malware
-
social Engineering
the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
Data Intereption
a specific type of data theft, referring to information captured during transmission
SQL Ingestion
describe the source data, destination table, and any data transformations in a single SQL statement
Brute force Attactc
a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys
Ransomware
a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
virus
a small software program that spreads from one computer to another and interferes with computer operation.
spyware
malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
worm
a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network
-
Teacher Comments - You have made a good effort considering your written English work is still developing. There are some descriptions missing such as DDOS, Phishing and blagging. You should hve included prevention techniques for each threat. Overall, you have tried in class but there is not much evidence you have worked on this for prep.