Description should include, but not be limited to
- steganography (e.g., embedded virus/Trojan/malware in pictures)
- attacks on authentication (e.g., password, biometrics, terrorism)
- acts of terrorism and how they present a threat
- pandemics and how they present a threat
- phishing scams
- hacking, spamming, malvertising
- marketing campaign hijacking
- web vs. applications
- cross-site scripting attack (XSS)
- local file inclusions (LFI)
- SQL injection (SQLi)
- phishing attacks, spear phishing, and whaling
- denial of service (DoS)
- distributed denial of service – (DDos), bonnets, and smurf attacks
- malware (e.g., virus, worm, botnet, ransomware)
- infrastructure
- competitor-sponsored hacking
- nation-state sponsored hacking
- dark web.
Process/Skill Questions:
- What are different types of cyber threats?
- How does each type work?
- How can these cyber threats be prevented?