ways to spot a phishing email
what is malware
software written to infect computers and commit crimes like fraud and identity theft
what is phishing
designed to get you to give away personal information using emails purporting to be reputable companies
what is a brute force attack
a trial and error method to decode encrypted data such as passwords and keys carries carried out by programs
what is a denial of service attack
involves flooding a server with useless traffic causing it to overload and become unavailable
what is data interception and theft
an attacker monitors data streams to and from a target to gather sensitive information
what is an SQL injection
a code injection technique used to attack data driven applications
what does it mean when people are the weak point of a network
when system vulnerabilities are caused by people being careless
what is the purpose of a malware attack
what is the purpose of a phishing attack
what is the purpose of a brute force attack
what is the purpose of a denial of service attack
what is the purpose of data interception and theft
what is the purpose of an SQL injection
what are examples of when people can be a weak point of a system
what are 7 common prevention methods
how do you limit threats posed from a malware attack
how do you limit threats posed from a phishing attack
what do we mean by strong security software
firewall, spam filter, anti-virus, anti-spyware
how do you limit the threats posed from a brute force attack
how do you limit the threats posed by a denial of service attack
what is configuration of a web server
spotting when attacks are taking place and then preventing them from reaching the server
how do you limit the threats posed by data interception and theft
how do you limit threats posed by SQL injection