back door - allows remote access to a computer system, DDoS attack - an attack that overwhelmes a web server by targeting requests, exploit - take advantage of a vulnerability, hacking - unauthorised access to a computer or network or the modification of programs, systems or security for unapproved purposes, honeypot - a decoy server that imitates the 'real' website to lure attackers away from production systems to waste time and dissapate their energies harmlessly, hot site - prepared external recovery IT infrastructure; where the duplicate is ready immediately to replace operations by restoring backups and resuming normal operations with little or no downtime , cold site - prepared external recovery IT infrastructure; when the duplicate is not immediately ready to replace operations, and may take a few weeks to resume normal operations, malware - 'malicious software' designed to infiltrate and damage computer systems without authorisation, man-in-the-middle (MITM) attack - a type of eavesdropping attack where communications and data are exposed to an unauthorised third party , phishing - pretending to be a reputable person or entity in order to induce the disclosure of sensitive information, ransomware - malicious software that will lock or encrypt a user's computer until a ransom fee is paid, risk tolerance - the quantity and nature of risk that is acceptable, social engineering attack - tricking the victim into clicking 'accept' with admin permissions or into giving the attacker physical access to a device, spyware - a program that collects information without the user's knowledge; it arrives as a free download and is automatically installed, threat modelling principles - a set of principals that outline how to prepare for dealing with cyber security threats, version control - records each stage of the development so that it is possible to 'roll back' to any previous point in the development, warm site - a recovery plan that is in between hot and cold, and limited in scope and scale compared with normal operations; it relies on restored backups beings brought online before systems and services can be make operational,
0%
Cyber Security Risks
共用
共用
共用
由
Melzulfic
Y11
Y12
編輯內容
列印
嵌入
更多
作業
排行榜
顯示更多
顯示更少
此排行榜當前是私有的。單擊
共用
使其公開。
資源擁有者已禁用此排行榜。
此排行榜被禁用,因為您的選項與資源擁有者不同。
還原選項
匹配遊戲
是一個開放式範本。它不會為排行榜生成分數。
需要登錄
視覺風格
字體
需要訂閱
選項
切換範本
顯示所有
播放活動時將顯示更多格式。
打開結果
複製連結
QR 代碼
刪除
恢復自動保存:
?