Icon Crear Crear

Security Threats

Froggy Jumps

(4)
This section introduces you to the most common threats to data confidentiality, integrity, and availability.

Descarga la versión para jugar en papel

Edad recomendada: 11 años
455 veces realizada

Creada por

Estados Unidos

Top 10 resultados

  1. 1
    Huntley
    Huntley
    00:51
    tiempo
    100
    puntuacion
  2. 2
    Kelli H.
    Kelli H.
    01:07
    tiempo
    100
    puntuacion
  3. 3
    Flamingo
    Flamingo
    01:22
    tiempo
    100
    puntuacion
  4. 4
    JoeKnows
    JoeKnows
    01:23
    tiempo
    100
    puntuacion
  5. 5
    John
    John
    01:38
    tiempo
    100
    puntuacion
  6. 6
    01:41
    tiempo
    91
    puntuacion
  7. 7
    Tiffany Stacey
    Tiffany Stacey
    01:34
    tiempo
    82
    puntuacion
  8. 8
    01:41
    tiempo
    82
    puntuacion
  9. 9
    PS
    PS
    01:38
    tiempo
    73
    puntuacion
  10. 10
    Luis
    Luis
    01:39
    tiempo
    73
    puntuacion
¿Quieres aparecer en el Top 10 de este juego? para identificarte.
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad

Top juegos

  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
 
game-icon

Froggy Jumps

Security ThreatsVersión en línea

This section introduces you to the most common threats to data confidentiality, integrity, and availability.

por Mr. B
1

A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.

2

The passive gathering of information about a potential victim

3

Attempting to secretively discover private information about a person, company, or other entity.

4

Exploiting a victim using email messages.

5

The use of deception to gain personal and/or private information for unlawful purposes.

6

An attempt to connect to a server by capturing and resending authentication information.

7

An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information.

8

Tricking a victim into revealing sensitive information under false pretenses

9

Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.

10

An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

11

An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.

educaplay suscripción