Threats to computer systems and networks - Match-up

Match-up definitions and answers with key terms and examples. Press submit to check your answers.

Malware
Data Interception
Brute Force Attack
Phishing
Social Engineering
Denial of Service


Answers
Data is read in transit by an attacker
Malicious Software
All possible combination for passwords are attempted
Emails are sent out impersonating a person or company in order to gain someones trust
Flooding a server with requests so no one else can access it
Using people as the weakness in a security system
Log in or sign-up to access the match-up activity



Don't have a login?

You can still revise this topic