Phishing - A ______ occurs when a hacker pretends to be a legitimate company to trick individuals into giving up personal information., Encryption - To secure sensitive data, many companies use ______, which converts information into a secret code., Firewall - A ______ acts as a barrier between a trusted internal network and untrusted external networks., Ransomware - ______ is a type of malicious software that demands payment to unlock encrypted data., Malware - Any software that is intended to cause harm to a computer, server, or network is known as ______., Vulnerability - A ______ in software can allow hackers to gain unauthorised access to systems., Breach - When a hacker successfully gains access to protected data, this is called a ______., Zero-day attack - A ______ occurs when attackers exploit a security flaw before it is known or fixed., Penetration testing - Companies often perform ______ to identify and fix security weaknesses in their systems., Cryptography - The art of writing or solving codes, used to protect data, is called ______.,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?