Answers
Intercepting and potentially altering communications between two parties without their knowledge
Malicious software designed to damage, disrupt, or steal data
Accessing a system without permission, commonly known as hacking
Deceptive emails mimicking legitimate sources to steal sensitive information
Redirecting users to fake websites to steal personal information by compromising DNS servers
Attacks on IT systems from outside sources, typically through the internet
Tricking individuals into revealing sensitive information through deception
Observing someone's confidential information by physically looking over their shoulder
Hacking without the owner's permission but without exploiting any weaknesses found
Overloading a server with requests to disrupt its normal operations
Legal hacking performed to test and improve system security
Unauthorised hacking with malicious intent or illegal purposes
A coordinated DoS attack from multiple infected computers (botnet) to overwhelm a target