This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Everything Needs Security

| See more in IT Security

Fill in the puzzle by answering the clues

sherrybenjamin
By
Created Date 04.11.22
Last Updated 04.11.22
Viewed 4 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • any computer code that can be used to steal data, bypass access controls, or harm or compromise a system
  • malware designed to track the actions of users and capture data
  • software that automatically delivers advertisements. Some types contain spyware.
  • malware designed to automatically perform actions over the Internet
  • a type of malware that holds a computer system captive, frequently by encrypting essential data, until a payment is made to the attacker
  • malware that carries out malicious operations while appearing to have a desired function. They are included in non-executable files, unlike viruses
  • a type of social engineering attack in which an individual lies in order to gain access to privileged information
  • a type of social engineering attack in which an attacker follows an authorized person into a secure location
  • use of a generic fraudulent email that appears to be sent by a legitimate source. Tricks people into installing malware or sharing confident info
  • a popular port scanning tool that can be used to discover vulnerabilities in networked systems
  • a network of distributed infected hosts that is used to launch a DDoS attack
  • connect to a specific wireless network by the way of a network identifier
  • the process of converting information into a form where an unauthorized party cannot read it
  • hardware or software that prevents hackers from accessing your personal or company data
  • a program that scans a computer for malicious software and deletes it
  • monitors online activities and collects personal information without permission
  • a web based device scanner
  • a tool used to gather information about data flowing through a network
  • a conceptual outline of the stages of an information systems attack