Notice: This page requires JavaScript to function properly.
Please enable JavaScript in your browser settings or update your browser.
Leer Common Cyber Threats | Introduction to Cyber Security
Cyber Security Fundamentals

book
Common Cyber Threats

Before delving into cyber security techniques, it's essential to understand the threats we aim to counteract. Below is a list of the most prevalent cyber threats:

We will discover some of these threats in more detail in the next chapters.

question-icon

Match threats types with their descriptions:

Malware:
_ _ _

Phishing:
_ _ _

DDoS:
_ _ _

SQL Injection:
_ _ _

Click or drag`n`drop items and fill in the blanks

dots
Deceptive attempts to obtain sensitive information by posing as a trustworthy entity.
dots
Exploiting vulnerabilities in a database by injecting malicious SQL code.
dots
Overloading a system or network to disrupt its normal functioning.
dots
Malicious software designed to harm or exploit computer systems.

Was alles duidelijk?

Hoe kunnen we het verbeteren?

Bedankt voor je feedback!

Sectie 1. Hoofdstuk 2

Vraag AI

expand
ChatGPT

Vraag wat u wilt of probeer een van de voorgestelde vragen om onze chat te starten.

some-alt