• Unit 22 - Learning Aim A
     Help
  • I hide inside files or programs, pretending to be useful — but once opened, I attack.
    Trojan horse
  • I flood servers with so much traffic that real users can’t get through.
    Denial of Service (DoS) attack
  • I trick users into giving away passwords using fake websites or emails.
    Phishing
  • Unlock this slideshow and over 4 million more with Baamboozle+
    Try slideshows
  • Your experience on this site will be improved by allowing cookies.