Phishing
Effects and preventions of phishing
Hacking
Effects and preventions of hacking
Virus
Effects and preventions of virus
Trojan
Effects and preventions of trojans
Interception
Unofficial party has gained access to an asset. The outside party can be a person, program or computer system.
Effects and prevention of interception
Eavesdropping
Intercepting conversations without the awareness or consent of at least one of the participants.
Specialised program used to sniff and record packets of data communication from a network and then after it’s listened to or read using tools for analysis and decryption.
Effects and preventions of eavesdropping
Data theft
Information illegally copied or stolen from a business or person. Information regards passwords, card details and etc.
Effects and preventions of data theft
Social engineering
Influencing people so they give up private information. Criminals trick you into giving them your passwords or ban info or access your computer secretly to install malicious software. This gives them control over your whole computer.
Social engineering effects and preventions