2017-03-March-AMAL-Cyber Security.pdf

31 downloads 0 Views 4MB Size Report
II. Worms VII. Adware. III. Trojans VIII. Scareware. IV. Bot armies IX. Ransomware. V. Keystroke loggers. In August 2009, attackers shut down Twitter for nearly.