Branch of cyber security, Information security, data, CIA Triad also known as, Threats, Confidentiality, Integrity, Availability, __________ is a path through which an attacker hacks your device, Vulnerability, Integrity, OTP, One time password, Our time password, FIR, First investigation reports, First individual report, ________ is a form of an illegal act where sensitive information such as passwords and credit card details, Worm, Phishing, DDoS, Distributed denial of service, Donot Disturb operating system, __________ is a computer program which runs on any computer system, threats, virus, __________ is a type of computer virus, but it works a bit differently than other viruses, Malware, Worm, ______ attack technique is used by an adversary to steal data from your system., Brute force, Malware.

class 8 computer science

Leaderboard

Visual style

Options

Switch template

)
Continue editing: ?