This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Cybersecurity Facts

| See more in IT Security

cybersecurity facts

luissaucedo
Created Date 02.21.22
Last Updated 02.22.22
Viewed 1 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Would you like to build your own game?

It's easy!

Go to the GameBuilder and get started!

Topics of this game:
  • This is used to log in to an account. (Remember to use more than 8 characters when creating)
  • This company disclosed that a breach in August 2013 by a group of hackers compromised 1 billion accounts.
  • ______ is a network security device that monitors and filters incoming and outgoing network traffic.
  • A type of malware that misleads users of its true intent.
  • Posing as legitimate institutions or people to get them to divulge personal details.
  • A process intended to eliminate a means of attack by patching vulnerabilities and turning off nonessential services.
  • Refers to an organization's efforts to keep their data private or secret.
  • This malicious software is designed to encrypt the victim's data storage drives and then demanding payment in return for the encryption key.