What is the term that describes a scam in which a malicious party impersonates a known entity to steal sensitive information via email?, Encryption, Phishing, Netiquette, Firewall, What is the process of converting information into unreadable code to prevent unauthorized access called?, Fraud, Biometrics, Spyware, Encryption, What kind of malware is designed to collect information about the user's actions on the computer without their knowledge?, Spyware, Open Source, Algorithm, Cloud Computing, What does “Hit the headlines” mean?, Delete information, Hide data, Become very popular in the news , Send emails, What are “Countermeasures”?, Social networks, Types of computers, Email messages, Actions to prevent attacks, What does “Encrypted” mean?, Deleted data, Copied, Hidden using a code, Printed, What does “Spyware” do?, Protects data, Collects information secretly, Deletes files, Sends emails, What is “Malware”?, Website, Safe software, Harmful software , Password, What is “VPN”?, Email, Game, Secure internet connection , Virus, What is “Cloud storage”?, Physical disk, Saving files online , Printing, Deleting, What is “Biometric authentication”?, Password, Virus, Email, Fingerprint/face login , What is a “Data breach”?, Game, Backup, Data leak or theft , Password, What is “Ransomware”?, free app, B. Malware locks your data and asks for money , password, A browser, What is “Cybersecurity”?, Physical security, Protection of systems and networks , Social media, Games, What is “Personal data”?, Public information, Information about a person , Computer hardware, Software, What is “Identity Theft”?, Creating passwords, Stealing someone’s personal info , Sending emails, Buying devices, What is “Two-factor authentication”?, Email, One password, Extra security with two steps , A virus, What is “Netiquette”?, Internet behavior rules , Device, Virus, Password.

Leaderboard

Visual style

Options

Switch template

)
Continue editing: ?