Intro
Objectives
- Describe the processes involved in, and the aim of carrying out, a range of cyber security threats including:
- brute-force attack;
- data interception;
- distributed denial of service (DDoS) attack;
- hacking;
- malware (virus, worm, Trojan horse, spyware, adware, ransomware);
- pharming;
- phishing and social engineering.