TCP layer
Interwebs
IP layer
SSL layer
Spware
Botnets
Virus
Malware
When it is being transferred via usb stick.
When it is in transit.
When it is being written. When it is at rest.
When it is being written.
Connect to the Web, deliver email, and transfer files.
Connect to the Web, compress data, encrypt mail.
Connect to the web, conceal data, transfer files.
Connect to the Web, encrypt data, transmit information.
They are not encrypted, just sent via secure server.
They are encrypted.
Secure cookies are passed along via encrypted programs.
Cookies are always traded between trusted users.
Static, dynamic, enigmatic
Known, well-known, unknown
Well-known, registered, and static/dynamic.
Unknown, unregistered, invalid
Social engineering, or psychological manipulation.
SQL injection
Buffer overflow
Hacking via the Internet
Small scale machines such as diebold ATMs
Large-scale sequel databases such as those containing credit card information.
Servers running SQL databases similar to Hadoop or Hive.
Servers built on NoSQL
CAPTCHAs
Virtual machines
Proxies
Firewalls
Public authorization key
Public ephemeral key authorization key
Asymmetric authorization keys
Symmetric authorization keys
Public signature authentication key
Private signature authentication key
Symmetric signature authentication key
Private signature key
Application-level gateways
Circuit-level gateways
Proxy Server Gateways
Packet filters
POST
DELETE
TRACE
GET
Floppy Disk
Email attachments
Network connection
All of the above
Phishing and Fraud
Spoofing mails
Chain mails
All of the Above
Do not open attachments from suspicious sources.
Delete chain and junk mails.
Backup your files.
One
Two
Three
Four
Fraudulently acquiring sensitive information.
An encryption technique
An anti-spam technique
A password building technique
Internet Messaging Application
Interanet Messaging Application
Interanet Message Access Protocol
Internet Message Access Protocol
Viruses
Trojans
Spams