Unit 7 Vocabulary - IT Security
Try to collect as many vegetables as you can to make your own delicious chakalaka!
Threat Modeling (STRIDE)
You'll be asked to match definitions within the STRIDE categories, which is used in risk analysis and threat modeling.
Threat Modeling (DREAD)
You'll learn definitions within the DREAD categories, which is used in risk analysis and threat modeling.
Special Permissions (Linux)
You'll become familiar with special permissions in the Linux operating system.
Security Control Process
You'll learn the five steps to the Security Control Process.
Security Administration Process
You'll learn to recognize the steps in the Security Administration Process.
Securing Computers from Threats
You'll be introduced to how you can secure computers against future threats.
Protocol Acronyms
Test your knowledge of the most common network protocol acronyms.
Port Scan Home Run
You'll test your knowledge of port scanning.
Pornography Quiz (Malay Language)
Learn about the harms of pornography