F F กF ก1. ก F 1. Hacker 2. Cracker 3. Threats 4. ...
of 1

Pretest 308-2-54-1

Published on: Mar 4, 2016
Published in: Education      Technology      
Source: www.slideshare.net


Transcripts - Pretest 308-2-54-1

  • 1. F F กF ก1. ก F 1. Hacker 2. Cracker 3. Threats 4. Denial of Service 5. Misuse 6. Disclosure 7. Modification 8. Destruction 9. Malware 10. Virus Computer 11. Trojan 12. Worm 13. Hoax 14. Spyware 15. Spam mail 16. Social Engineering 17. Phishing 18. WEP 19. WPA 20. Security2. F ก3. กก PDCA ก F4. ก F F F กF F F5. ก ก F ก F F6. ก ก F F F ก ก F F ก ก F F ก Fก F F