Ethical Hacking - Authorized testing of systems to identify and fix security vulnerabilities., Penetration 'Pen' Testing - Simulating cyberattacks to find and address security weaknesses., Disaster Recovery - Plans and actions taken to recover from a cyberattack., Security Policies - Rules and guidelines to protect information systems., Software Policies - Guidelines on the installation and use of acceptable software., After an Attack - Steps taken to investigate, respond, manage, recover, and analyze an incident., Data Protection Controller - A person responsible for ensuring data is handled securely and complies with data protection laws., Remedial Action - Steps taken to fix issues and improve security after a cyberattack.,
0%
Cyberattack Responses
Del
Del
Del
etter
Gcoakley1
Secondary
KS4
Y9
IT
Computing
Rediger innhold
Skriv ut
Innebygd
Mer
Tildelinger
Ledertavle
Flash-kort
er en åpen mal. Det genererer ikke poengsummer for en ledertavle.
Pålogging kreves
Visuell stil
Skrifter
Krever abonnement
Alternativer
Bytt mal
Vis alle
Flere formater vises når du spiller av aktiviteten.
Åpne resultater
Kopier kobling
QR-kode
Slette
Gjenopprett automatisk lagring:
?