Viruses - Programs embedded (hidden) within other files. They replicate themselves and become part of other programs. ............... often cause damage by deleting or modifying data., Worms - Programs similar to viruses except that they are not hidden within other files. ................ often spread through emails., Trojans - Programs which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. .............. cannot spread by themselves - instead they deceive a user into installing the program., Spyware - Programs that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker., Ransomware - Programs that attempt to blackmail a user into making a payment to a hacker. Some types of ............ do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid., Phishing - Emails that try to trick users into giving away personal details. The ............. email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company, for example, a bank. However, it is a fake website designed to catch data such as bank account numbers and security codes., Brute force - Where a program is used to find a password by trying all possible combinations of characters until the correct one is obtained., Denial of service - Where a computer (or many computers) is used to prevent a server from performing its tasks. This is done by bombarding the server over and over again with requests. Eventually the server is tied up trying to handle all the ............ requests, making it very difficult for it to respond to legitimate requests., intercepted - Data can be ...... during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker., SQL injection - Where SQL code is entered as a data input. Many databases use SQL code to interrogate the data and maintain the structure. SQL code can be inputted as data, which can cause errors or unintended operations., network policy - A poor ............... / ................. is where a network does not have security rules in place for users to follow. [3 words],
0%
network security
공유
공유
공유
만든이
Snicholson
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
크로스워드
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?