5.3.1 Describe the processes involved in, and the aim of carrying out, a range of cyber security threats
Including:
brute-force attack
data interception
distributed denial of service (DDoS) attack
hacking
malware (virus, worm, Trojan horse,
spyware, adware, ransomware)
pharming
phishing
social engineering