A type of malware that encrypts a victim's data and demands payment in exchange for the decryption key
An attack in which an attacker sends an email, text message or other communication that appears to be from a reputable source in order to trick the user into entering sensitive information
A type of denial-of-service attack that floods a network with traffic in order to disrupt its operation
A type of attack in which an attacker gains access to a network by posing as an authorized user
All courses were automatically generated using OpenAI's GPT-3. Your feedback helps us improve as we cannot manually review every course. Thank you!