fraud, lying or tricking someone to get money or something valuable., identity, The characteristics, qualities, or beliefs that make a person or thing unique., security settings, options that help protect your devices or accounts from unauthorized access or threats., vishing, fraudulent phone calls or voice messages designed to trick victims into providing sensitive information, like login credentials, credit card numbers, or bank details, netiquette, an ideal pattern of behavior for Internet users, guidelines about what is acceptable in an online medium for personal and professional use., smishing, conducted via SMS (text messages). These messages often contain malicious links or requests for personal information, a strong password, A strong password is: At least 12 characters long but 14 or more is better. A combination of uppercase letters, lowercase letters, numbers, and symbols, Two-factor authentication, is an identity and access management security method that requires two forms of identification to access resources and data, setting, software control panel that enables the user to configure the appearance or actions in an application, operating system or the hardware, disclose, to reveal or make something known, privacy policy, a statement that explains how an organization collects, uses, and protects personal information.to reveal or make something known, angler, occurs on social media platforms. Attackers create fake accounts or impersonate companies to steal personal information or spread malware., phishing, Phishing is a cyber attack that uses deceptive techniques to steal sensitive information, such techniques to steal sensitive information, such as login credentials and financial details,, email, a string of characters used to verify the identity of a user during the authentication process., dumpster diving, a technique used to retrieve information that could be used to carry out an attack or gain access to a computer network from disposed items, spear, A targeted phishing attack that focuses on a specific individual or organization., whaling, targets high-profile individuals, such as executives or CEOs..
0%
task1
共享
共享
共享
由
Idanjo3
编辑内容
打印
嵌入
更多
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
匹配游戏
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
切换模板
显示所有
播放活动时将显示更多格式。
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?