back door - allows remote access to a computer system, DDoS attack - an attack that overwhelmes a web server by targeting requests, exploit - take advantage of a vulnerability, hacking - unauthorised access to a computer or network or the modification of programs, systems or security for unapproved purposes, honeypot - a decoy server that imitates the 'real' website to lure attackers away from production systems to waste time and dissapate their energies harmlessly, hot site - prepared external recovery IT infrastructure; where the duplicate is ready immediately to replace operations by restoring backups and resuming normal operations with little or no downtime , cold site - prepared external recovery IT infrastructure; when the duplicate is not immediately ready to replace operations, and may take a few weeks to resume normal operations, malware - 'malicious software' designed to infiltrate and damage computer systems without authorisation, man-in-the-middle (MITM) attack - a type of eavesdropping attack where communications and data are exposed to an unauthorised third party , phishing - pretending to be a reputable person or entity in order to induce the disclosure of sensitive information, ransomware - malicious software that will lock or encrypt a user's computer until a ransom fee is paid, risk tolerance - the quantity and nature of risk that is acceptable, social engineering attack - tricking the victim into clicking 'accept' with admin permissions or into giving the attacker physical access to a device, spyware - a program that collects information without the user's knowledge; it arrives as a free download and is automatically installed, threat modelling principles - a set of principals that outline how to prepare for dealing with cyber security threats, version control - records each stage of the development so that it is possible to 'roll back' to any previous point in the development, warm site - a recovery plan that is in between hot and cold, and limited in scope and scale compared with normal operations; it relies on restored backups beings brought online before systems and services can be make operational,
0%
Cyber Security Risks
공유
공유
공유
만든이
Melzulfic
Y11
Y12
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
매치업
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?