Criado por Alex Cochrane
aproximadamente 8 anos atrás
|
||
Phishing
How to spot an Phishing email
Shoulder surfing
Malware
Brute force attacks
Denial of service (DOS) attacks
Viruses
Worms
Removable media
Eavesdropping
SQL injection
Penetration testing
Black box testing
White box testing
Grey-hat hackers
Audit trails
Network forensics
Network policies
Proxy server
Functions of an operating system
Utilities