Likelihood, The chance or probability that something will happen., Countermeasures, Actions taken to prevent or stop something unwanted., Encrypted, Information converted into a secret code to keep it private., Spyware, Software that secretly monitors and records your online activities., Sophisticated, Something that uses highly complex or advanced techniques., Intact, Remaining completely whole, functional, and undamaged., Cybersecurity, Protecting systems, networks, and data from digital attacks., Identity Theft, Stealing someone's private information to commit fraud., Digital Footprint, The trail of data you leave behind when using the internet., Phishing, Deceptive attacks used to trick people into revealing sensitive info., Two-factor authentication, A security process requiring two different forms of identification., Netiquette, Rules and guidelines for polite and acceptable behavior online., Firewall, A system that filters network traffic, Bandwidth, The maximum data transfer rate., Cloud Computing, Storing data on the internet., Malware, Harmful software like viruses., Router, A device that directs network traffic., Vulnerability, A security flaw or weakness., Server, A computer providing network services., Algorithm, Step-by-step computing rules..
0%
Eitan
Share
Share
Share
by
Eitan9899
Edit Content
Print
Embed
More
Leaderboard
See top players
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Leaderboard
See top players
)
Open results
Copy link
QR code
Delete
Continue editing:
?