Unit 22 - Learning Aim A
Help
I hide inside files or programs, pretending to be useful — but once opened, I attack.
Trojan horse
I flood servers with so much traffic that real users can’t get through.
Denial of Service (DoS) attack
I trick users into giving away passwords using fake websites or emails.
Phishing
Unlock this slideshow and over 4 million more with Baamboozle+
Try slideshows
Your experience on this site will be improved by allowing cookies.
Allow cookies