Utilisateur
Individuals or a group that exploit vulnerabilities and try to get unauthorised access to data
- Black hat
- White hat
Pieces of code that are able to copy themselves and spread throughout a system
A form of malware that secretly obtains info about a users computer activity by transmitting data from their device
Denial of Service attack is where a server is flooded with many requests at the same time, causing the server to crash
Distributed Denial of Service attack is similar to a DoS attack however multiple computers (used as bots) send requests to the server
A code injection technique used to attack data-driven apps
Several different manipulation techiniques to gain access personal or sensitive info that benefit the hacker
Phishing - Sending messages/emails that look legitamite to gain access to sensitive info
Pharming - Where malware is downloaded to a users devive without them knowing. This redirects the user to fraudulent websites
A piece of hardware or software that monitors and controls incoming and outgoing data
Tools to detect and remove spyware and any other forms of malware
2 Factor Authentication adds an extra layer of security by requiring users to show two formsof identification
A physical device placed between a network and a remote source. Traffic travei in & out of the device through the device