Page 2 - security threats new-1
P. 2
Contents
**Malicious software** ......................................................................................... 3
**Hacking and Cyber Vandalism** ...................................................................... 11
**Sniffing and Spoofing** ................................................................................... 18
INTRODUCTION ................................................................................................ 18
SNIFFING .......................................................................................................... 19
SPOOFING ......................................................................................................... 19
DIFFERENCE BETWEEN SNIFFING AND SPOOFING ........................................... 20
CONCLUSION..................................................................................................... 21
**Denial of service attack** ................................................................................ 22
What is a denial of service attack (DoS)? ..................................................... 22
**Identity Theft** ............................................................................................... 23
What Is Identity Theft?................................................................................... 23
KEY TAKEAWAYS ............................................................................................ 24
Understanding Identity Theft ............................................................................ 24
Types of Identity Theft ................................................................................... 24
❖ Financial identity theft ........................................................................... 24
❖ Social Security identity theft................................................................. 24
❖ Medical identity theft ............................................................................. 25
❖ Synthetic identity theft .......................................................................... 25
❖ Child identity theft ................................................................................. 25
❖ Tax identity theft .................................................................................... 25
❖ Criminal identity theft ............................................................................ 25
Identity Theft Protection ................................................................................ 25
**PHISHING** ..................................................................................................... 26