1
a .................................... is an individual who legally hacks into a businesses system to test security measures
2
Why may a hacker send a phishing email?
3
A type of malware that is designed to collect user information?
4
What security measure can be used to protect against accidental damage?
5
identity ........... can happen as a result of hacking, phishing emails and malware
6
.................: someone who gains unauthorised access to a computer system
7
A type of malware that hides itself as a legitimate program?
8
A type of malware that replicates itself over a network and requires no user interaction