Page 2 - security threats new-1
P. 2

Contents






               **Malicious software** ......................................................................................... 3

               **Hacking and Cyber Vandalism** ...................................................................... 11
               **Sniffing and Spoofing** ................................................................................... 18

                  INTRODUCTION ................................................................................................ 18

                  SNIFFING .......................................................................................................... 19
                  SPOOFING ......................................................................................................... 19

                  DIFFERENCE BETWEEN SNIFFING AND SPOOFING ........................................... 20

                  CONCLUSION..................................................................................................... 21

               **Denial of service attack** ................................................................................ 22

               What is a denial of service attack (DoS)? ..................................................... 22
               **Identity Theft** ............................................................................................... 23

                  What Is Identity Theft?................................................................................... 23

                    KEY TAKEAWAYS ............................................................................................ 24

                  Understanding Identity Theft ............................................................................ 24
                  Types of Identity Theft ................................................................................... 24

                    ❖  Financial identity theft ........................................................................... 24

                    ❖  Social Security identity theft................................................................. 24

                    ❖  Medical identity theft ............................................................................. 25
                    ❖  Synthetic identity theft .......................................................................... 25

                    ❖  Child identity theft ................................................................................. 25

                    ❖  Tax identity theft .................................................................................... 25

                    ❖  Criminal identity theft ............................................................................ 25

                  Identity Theft Protection ................................................................................ 25
               **PHISHING** ..................................................................................................... 26
   1   2   3   4   5   6   7