5.3 Cyber Security

Security Threats

Denial Of Service

Aims of a DDOS Attack

Solution?

Annotation of Denial Of Service Attack

Phishing

Solution?

Pharming

Solution?

Brute Force Attack

Solution?

Data Interception

Solution?

Hacking

Solution?

Social Engineering

Different social engineering threats

Solution?

Malware

Virus

Solution for Virus

Worm

Adware

Trojan horse

Spyware

Solution for Spyware

Ransomware

Solution for Ransomware

Solutions for security threats

Access Levels

Antivirus/Antispyware

Authentication (passwords)

Authentication (two-step verification)

Firewall/Proxy

Difference between Firewall and Proxy

Biometrics

SSL