Threats to computer systems and networks - Match-up

Match-up definitions and answers with key terms and examples. Press submit to check your answers.

Malware
Data Interception
Brute Force Attack
Phishing
Social Engineering
Denial of Service


Answers
All possible combination for passwords are attempted
Malicious Software
Emails are sent out impersonating a person or company in order to gain someones trust
Data is read in transit by an attacker
Using people as the weakness in a security system
Flooding a server with requests so no one else can access it
Log in or sign-up to access the match-up activity



Don't have a login?

You can still revise this topic