Icon New game New game
Get Academic Plan
Get Academic Plan
Get Academic Plan

Security Threats

Froggy Jumps

(4)
This section introduces you to the most common threats to data confidentiality, integrity, and availability.

Download the paper version to play

Recommended age: 11 years old
455 times made

Created by

United States

Top 10 results

  1. 1
    Huntley
    Huntley
    00:51
    time
    100
    score
  2. 2
    Kelli H.
    Kelli H.
    01:07
    time
    100
    score
  3. 3
    Flamingo
    Flamingo
    01:22
    time
    100
    score
  4. 4
    JoeKnows
    JoeKnows
    01:23
    time
    100
    score
  5. 5
    John
    John
    01:38
    time
    100
    score
  6. 6
    01:41
    time
    91
    score
  7. 7
    Tiffany Stacey
    Tiffany Stacey
    01:34
    time
    82
    score
  8. 8
    01:41
    time
    82
    score
  9. 9
    PS
    PS
    01:38
    time
    73
    score
  10. 10
    Luis
    Luis
    01:39
    time
    73
    score
Do you want to stay in the Top 10 of this game? to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

Froggy Jumps

Security ThreatsOnline version

This section introduces you to the most common threats to data confidentiality, integrity, and availability.

by Mr. B
1

A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.

2

The passive gathering of information about a potential victim

3

Attempting to secretively discover private information about a person, company, or other entity.

4

Exploiting a victim using email messages.

5

The use of deception to gain personal and/or private information for unlawful purposes.

6

An attempt to connect to a server by capturing and resending authentication information.

7

An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information.

8

Tricking a victim into revealing sensitive information under false pretenses

9

Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.

10

An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

11

An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.

educaplay suscripción