Professional Documents
Culture Documents
Section 2 - Cybersecurity Concept
Section 2 - Cybersecurity Concept
Guidelines
Communicate require
Policies is
Prohibited activities and behaviours
Botnets
GhostCrypt
Ransomware
SNSLocker
Keylogger
Rootkit
Worm
Rootkit
Buffer overflow
DoS attack
Man-in-the-middle attack
Social engineering
Other Atack type
Phishing
Spear phishing
Spoofing
Zero-day exploit