Firewall - Protects your network by blocking unauthorized access, Authentication - Verifying your identity before access, Data breach - Unauthorized access to sensitive data, Keylogger - Software that records keyboard inputs, Cyber hygiene - Practices to maintain system security, Spam filter - Software to block unwanted emails, Malware removal - Process to delete malicious software, BYOD - Bring Your Own Device policy in companies, Cyber Espionage - Spying by stealing sensitive digital information, Log Analysis - Reviewing logs to detect suspicious activity, Hijacking - Taking control of a legitimate user’s session, SIM Swapping - Fraud technique to hijack phone numbers, Security Audit - Review of systems to ensure security compliance, Threat Intelligence - Information about potential cyber threats, Phishing Awareness - Recognizing phishing attempts to avoid falling victim,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?