Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyber Security Emily - Coggle Diagram
Cyber Security Emily
-
-
Shouldering
It involves the attacker watching the victim while they provide sensitive information, for example, over their shoulder.
-
Blagging
This attack often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for
Blagging (also known as pretexting) is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
virus
Among the many classes of malware, viruses are among the oldest and most diverse.
Brute force
A brute force attack is a hacking method that uses trial and error to crack passwords, login credentials, and encryption.
-
-
-
Teacher Comments: You have provided some good descriptions of the threats but not always provided prevention methods. There are some areas incomplete. The mindmap is well presented. If it was finished it would be a great job.