Cyber Security Threats
Brute Force Attack
Using Common passwords
Data Interception
DDoS
Hacking
Virus
Malware
Ransomware
Malware
Holds data hostage for ransom using decryption key
Adware
Malware
Spyware
Malware
Trojan Horse
Malware
Malicious software disguised as legitimate software
Worms
Malware
Phishing/Scam
Malware
Sends out Illlegitimate Emails
Pharming
Malware
Social Engineering
Malware
War driving