Phishing
An attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from…
An attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from…
Systems are tested for vulnerabilities to reveal any weaknesses in the system which can be fixed.
A collection of characters for user authentication to secure access.
Policies that provides rules and guidelines on what network users can and cannot do.
Involves monitoring and analysing packets of data in a network to identify where data is going.
Software that is designed to cause harm or damage to a computer. This includes viruses that might damage files, adware…
Gaining unauthorised access to a computer.
An application or piece of hardware that prevents unauthorised connections to and from the Internet.
Stands for Denial of Service. An attack designed to render online services inaccessible. One type of this attack involves many…
Stands for Distributed Denial of Service. An attack designed to render online services inaccessible. One type of this attack involves…