Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.4 network security - Coggle Diagram
1.4 network security
Malware
Spyware
secretly installs on devices to monitor user activity, steal sensitive data
trojan
as a type of malicious software that disguises itself as legitimate, safe software to trick users into installing it
worms
self-replicating type of malware that spreads across networks without needing a host program or human help.
-
-
-
-
SQL injection
attempt to exploit vulnerabilities in an application's code by inserting an SQL query into regular input or form fields, such as a us
-
-