Page 36 - SEE40-Implementation-paper_EN
P. 36

Popular threats




          W h a t   y o u   s h o u l d   b e   p a r t i c u l a r l y   c a r e f u l   a b o u t :





                         M a l w a r e
                         Software which is designed to damage your devices (PC, servers and so on). It includes:

                         trojans, viruses, worms, spyware, etc.




                         P h i s h i n g
                         This is a type of cyber attack in which scammers impersonate some well-known

                         institutions/person (banks, government agencies, work colleague, etc.) with the intention
                         of extracting your confidential data.


                         M a n - i n - t h e - m i d d l e   a t t a c k

                         MITM is type of attack where hackers try to get in position between the victim and a
                         certain application (for example, a bank) and his purpose is to intercept your data and
                         remain unnoticed.
                                                                                                            36
  Icons made by Freepik from www.flaticon.com
   31   32   33   34   35   36   37   38   39   40   41