How are viruses used?
What is the purpose/effect of viruses?
How are trojans used?
What is the purpose/effect of trojans?
How are worms used?
Replicate and distribute independently
What is the purpose/effect of worms?
How is spyware used?
What is the purpose/effect of spyware?
How is ransomware used?
Locks computers or encrypts files
What is the purpose/effect of ransomware?
The attacker can then demand a fee for the release of files/computer though there is no guarantee of their return
How is phishing used?
What is the purpose/effect of phishing?
How is pharming used?
What is the purpose/effect of pharming?
Tricks victims into revealing personal details
How is blagging used?
The attacker attempts to engage in an online conversation with the victim
What is the purpose/effect of blagging?
Tricks victims into revealing their personal details
How is shoulder surfing used?
Physical monitoring of someone e.g. over their shoulder or CCTV
What is the purpose/effect of shoulder surfing?
To gain PIN or room codes or passwords
How is MITM used?
What is the purpose/effect of MITM?
How is DoS used?
What is the purpose/effect of DoS?
Slows down or crashes server
How is SQL injection used?
Manipulating an SQL query so that additional code can be read by the system
What is the purpose/effect of an SQL injection?