Not every attack on a PC depends on placing executable code on the PC itself. Besides malware, a number of network attacks may be attempted. These are generally categorized according to the method of the malicious access or attack. This section will cover the following topics:
- Man-in-the-middle
- DDoS
- DoS
- Replay
- Smurf attacks
- Spoofing
- Spam
- Phishing
- Spim
- Vishing
- Spear phishing
- Xmas attacks
- Pharming
- Privilege escalation
- Malicious insider threat . . .
The content below this message is for members only.