at least one capital letter, at least one numerical value, at least one other keyboard character
15
components of an access level :
administrator, standart, guest
15
Difference between Phishing and Pharming?
two similar but different types of cybercrime.Phishing involves sending deceptive communication. Pharming is a more advanced method that manipulates DNS records
Viruses are programs or program code that replicate (copies themselves) with the intention of deleting or corrupting files
15
what is Adware?
Adware is a type of malware. At its least dangerous it will attempt to flood an end-user with unwanted advertising.
15
Spyware is...
Spyware is software that gathers information by monitoring a user’s activities carried out on their computer.
15
Trojans horse ...
A Trojan horse replaces all or part of the legitimate software with the intent of carrying out some harm to the user’s computer system.
15
what is Worms?
Worms are a type of stand-alone malware that can self-replicate.
15
what is DDoS stands for?
Distributed Denial of Service
15
what is Data interception?
Data interception is a form of stealing data by tapping into a wired or wireless communication link.
15
what is Brute force attack?
If a hacker wants to ‘crack’ your password, they can systematically try all the different combinations of letters, numbers and other symbols until eventually