1: Denial Of Service
2: Distributed DoSs
3: Sniffing
4: Spoofing
5: SQL injection
6: Viruses and Worms
7: Back Doors
8: Trojan Horses
9: Keyloggers
10: BruteForcing
11: Secret Question
12: Social Engineering
13: Phishing
14: Fake Messengers
15: Cookie Stealer
16: DNS Poisoning or PHARMING
17: Whaling
No comments:
Post a Comment