Jack:
Malware - viruses, worms & trojans
Brute force attacks
Toby:
Distributed Denial-of-Service attacks (DDoS)
Lee:
Web Application Attacks - SQL injection
Software Vulnerabilities - flaws and weaknesses in code or configuration
Anna:
Phishing Attacks - email phishing, spear phishing
Social Engineering - pretexting, baiting
Emily:
Man in the middle attacks - eavesdropping, ARP spoofing
Data Interception - packet sniffing
Create a 5-minute presentation for your topics.
You will present these to the rest of the class when complete.