Quellen ------- .. rubric:: Einleitung .. [Cyber-Sicherheit] | | https://www.kaspersky.de/resource-center/definitions/what-is-cyber-security .. .. rubric:: Hardware Sicherheit .. rubric:: Viren | https://upload.wikimedia.org/wikipedia/commons/e/ec/Virus_Blaster.jpg | https://de.wikipedia.org/wiki/Computervirus | https://www.hornetsecurity.com/de/wissensdatenbank/computervirus/?_adin=02021864894 | https://www.avast.com/de-de/c-computer-virus .. rubric:: Ransom & DoS | https://www.bsi.bund.de/DE/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Schadprogramme/Ransomware/ransomware_node.html | https://www.gdata.de/ratgeber/was-ist-eigentlich-ransomware | https://www.kaspersky.de/resource-center/threats/ransomware | https://threatpost.com/ransomware-volumes-record-highs-2021/168327/ | https://www.bsi.bund.de/DE/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/DoS-Denial-of-Service/dos-denial-of-service_node.html | https://www.link11.com/de/was-ist-eine-ddos-attacke/ .. rubric:: Social Engineering .. [Social-Engineering] | | https://de.wikipedia.org/wiki/Social_Engineering_(Sicherheit) | https://en.wikipedia.org/wiki/Social_engineering_(security) .. [Seven-Principles-of-Persuasion] | | https://en.wikipedia.org/wiki/Social_engineering_(security)#Six_key_principles | https://en.wikipedia.org/wiki/Influence:_Science_and_Practice | https://www.influenceatwork.com/7-principles-of-persuasion/ | https://gustdebacker.com/cialdini-principles/ | Cialdini, R. B. (2009). Influence : science and practice. Boston: Pearson Education. [https://archive.org/details/influencescience00cial_1] .. [Phishing] | | https://de.wikipedia.org/wiki/Phishing | https://en.wikipedia.org/wiki/Phishing .. [Pharming] | | https://de.wikipedia.org/wiki/Pharming_(Internet)