back door - allows remote access to a computer system, DDoS attack - an attack that overwhelmes a web server by targeting requests, exploit - take advantage of a vulnerability, hacking - unauthorised access to a computer or network or the modification of programs, systems or security for unapproved purposes, honeypot - a decoy server that imitates the 'real' website to lure attackers away from production systems to waste time and dissapate their energies harmlessly, hot site - prepared external recovery IT infrastructure; where the duplicate is ready immediately to replace operations by restoring backups and resuming normal operations with little or no downtime , cold site - prepared external recovery IT infrastructure; when the duplicate is not immediately ready to replace operations, and may take a few weeks to resume normal operations, malware - 'malicious software' designed to infiltrate and damage computer systems without authorisation, man-in-the-middle (MITM) attack - a type of eavesdropping attack where communications and data are exposed to an unauthorised third party , phishing - pretending to be a reputable person or entity in order to induce the disclosure of sensitive information, ransomware - malicious software that will lock or encrypt a user's computer until a ransom fee is paid, risk tolerance - the quantity and nature of risk that is acceptable, social engineering attack - tricking the victim into clicking 'accept' with admin permissions or into giving the attacker physical access to a device, spyware - a program that collects information without the user's knowledge; it arrives as a free download and is automatically installed, threat modelling principles - a set of principals that outline how to prepare for dealing with cyber security threats, version control - records each stage of the development so that it is possible to 'roll back' to any previous point in the development, warm site - a recovery plan that is in between hot and cold, and limited in scope and scale compared with normal operations; it relies on restored backups beings brought online before systems and services can be make operational,
0%
Cyber Security Risks
Bagikan
Bagikan
Bagikan
oleh
Melzulfic
Y11
Y12
Edit Konten
Cetak
Menyematkan
Tambah
Tugas
Papan Peringkat
Tampilkan lainnya
Tampilkan lebih sedikit
Papan peringkat ini saat ini bersifat pribadi. Klik
Share
untuk menjadikannya publik.
Papan peringkat ini telah dinonaktifkan oleh pemilik sumber daya.
Papan peringkat ini dinonaktifkan karena opsi Anda berbeda dengan pemilik sumber daya.
Opsi Pemulihan
Permainan Pencocokan
adalah templat terbuka. Ini tidak menghasilkan skor untuk papan peringkat.
Diperlukan login
Gaya visual
Font
Diperlukan langganan
Pilihan
Berganti templat
Tampilkan semua
Format lainnya akan muncul saat Anda memainkan aktivitas.
Buka hasil
Salin tautan
Kode QR
Hapus
Pulihkan simpan otomatis:
?