fraud, lying or tricking someone to get money or something valuable., identity, The characteristics, qualities, or beliefs that make a person or thing unique., security settings, options that help protect your devices or accounts from unauthorized access or threats., vishing, fraudulent phone calls or voice messages designed to trick victims into providing sensitive information, like login credentials, credit card numbers, or bank details, netiquette, an ideal pattern of behavior for Internet users, guidelines about what is acceptable in an online medium for personal and professional use., smishing, conducted via SMS (text messages). These messages often contain malicious links or requests for personal information, a strong password, A strong password is: At least 12 characters long but 14 or more is better. A combination of uppercase letters, lowercase letters, numbers, and symbols, Two-factor authentication, is an identity and access management security method that requires two forms of identification to access resources and data, setting, software control panel that enables the user to configure the appearance or actions in an application, operating system or the hardware, disclose, to reveal or make something known, privacy policy, a statement that explains how an organization collects, uses, and protects personal information.to reveal or make something known, angler, occurs on social media platforms. Attackers create fake accounts or impersonate companies to steal personal information or spread malware., phishing, Phishing is a cyber attack that uses deceptive techniques to steal sensitive information, such techniques to steal sensitive information, such as login credentials and financial details,, email, a string of characters used to verify the identity of a user during the authentication process., dumpster diving, a technique used to retrieve information that could be used to carry out an attack or gain access to a computer network from disposed items, spear, A targeted phishing attack that focuses on a specific individual or organization., whaling, targets high-profile individuals, such as executives or CEOs..
0%
task1
مشاركة
مشاركة
مشاركة
بواسطة
Idanjo3
تحرير المحتوى
طباعة
تضمين
المزيد
الواجبات
لوحة الصدارة
عرض المزيد
عرض أقل
لوحة الصدارة هذه في الوضع الخاص حاليًا. انقر على
مشاركة
لتجعلها عامة.
عَطَل مالك المورد لوحة الصدارة هذه.
عُطِلت لوحة الصدارة هذه حيث أنّ الخيارات الخاصة بك مختلفة عن مالك المورد.
خيارات الإرجاع
المطابقة
قالب مفتوح النهاية. ولا يصدر عنه درجات توضع في لوحة الصدارة.
يجب تسجيل الدخول
النمط البصري
الخطوط
يجب الاشتراك
الخيارات
تبديل القالب
إظهار الكل
ستظهر لك المزيد من التنسيقات عند تشغيل النشاط.
فتح النتائج
نسخ الرابط
رمز الاستجابة السريعة
حذف
استعادة الحفظ التلقائي:
؟