Please enable JavaScript.
Coggle requires JavaScript to display documents.
Threats - Coggle Diagram
Threats
Identification and Prevention Methods
Penetrating Testing
Anti-Malware software
Firewalls
User Access Levels
Passwords
Encryption
Physical Security
Malware
Viruses
Worms
Trogans
Ransomware
Spyware
Pharming
Social Engineering
Phishing
Pretexting
Shouldering
Data Interception and Theft
Packet Sniffing
Man-in-the-middle attacks
Brute force attacks
Denial of Service (DoS) attacks
The concept of SQL injection