Icon Créer jeu Créer jeu

Security Threats

Froggy Jumps

(4)
This section introduces you to the most common threats to data confidentiality, integrity, and availability.

Téléchargez la version pour jouer sur papier

Âge recommandé: 11 ans
455 fois fait

Créé par

United States

Top 10 résultats

  1. 1
    Huntley
    Huntley
    00:51
    temps
    100
    but
  2. 2
    Kelli H.
    Kelli H.
    01:07
    temps
    100
    but
  3. 3
    Flamingo
    Flamingo
    01:22
    temps
    100
    but
  4. 4
    JoeKnows
    JoeKnows
    01:23
    temps
    100
    but
  5. 5
    John
    John
    01:38
    temps
    100
    but
  6. 6
    01:41
    temps
    91
    but
  7. 7
    Tiffany Stacey
    Tiffany Stacey
    01:34
    temps
    82
    but
  8. 8
    01:41
    temps
    82
    but
  9. 9
    PS
    PS
    01:38
    temps
    73
    but
  10. 10
    Luis
    Luis
    01:39
    temps
    73
    but
Voulez-vous apparaître dans le Top 10 de ce jeu? pour vous identifier.
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu

Top Jeux

  1. temps
    but
  1. temps
    but
temps
but
temps
but
 
game-icon

Froggy Jumps

Security ThreatsVersion en ligne

This section introduces you to the most common threats to data confidentiality, integrity, and availability.

par Mr. B
1

A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.

2

The passive gathering of information about a potential victim

3

Attempting to secretively discover private information about a person, company, or other entity.

4

Exploiting a victim using email messages.

5

The use of deception to gain personal and/or private information for unlawful purposes.

6

An attempt to connect to a server by capturing and resending authentication information.

7

An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information.

8

Tricking a victim into revealing sensitive information under false pretenses

9

Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.

10

An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

11

An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.

educaplay suscripción