Icon New game New game
Get Academic Plan
Get Academic Plan
Get Academic Plan

Data breaches - VOCABULARY

Fill in the Blanks

Data Protection - lesson 04

Download the paper version to play

0 times made

Created by

Belarus

Top 10 results

There are still no results for this game. Be the first to stay in the ranking! to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

Fill in the Blanks

Data breaches - VOCABULARYOnline version

Data Protection - lesson 04

by Филипп Леонидович
1

Phishing Malware Ransomware cyberattack sensitive Hacking vulnerability hackers assessment leak firewall

1 . is one of the most common ways that cybercriminals gain unauthorized access to sensitive data .
2 . A can take many forms , such as malware infections , phishing scams , and denial - of - service attacks .
3 . The data breach was a result of a breach in the company's security systems , which allowed to access customer information .
4 . Exploiting a in software is one way that cybercriminals can gain access to sensitive data .
5 . A vulnerability can help identify weaknesses in a company's security systems that could lead to a data breach .
6 . The data was caused by a misconfigured server that allowed information to be accessible to the public .
7 . emails are a common tactic used by cybercriminals to trick people into revealing sensitive information .
8 . infections can be used to steal data , cause system damage , and facilitate cyberattacks .
9 . is a type of malware that encrypts data and demands payment in exchange for the decryption key .
10 . A is a network security system that monitors and controls incoming and outgoing network traffic .

2

Incident audit engineering Access Patches password Encryption secure authentication theft

1 . is a method of encoding data to protect it from unauthorized access .
2 . Two - factor is a security measure that requires users to provide two forms of identification before accessing a system .
3 . Identity is a type of crime where someone uses another person's personal information for fraudulent purposes .
4 . Social is a tactic used by cybercriminals to manipulate people into revealing sensitive information or performing actions that are harmful to the company .
5 . response is the process of reacting to and managing a data breach or other cybersecurity incident .
6 . A security is an evaluation of a company's security systems and procedures to identify potential vulnerabilities .
7 . are updates to software that address security vulnerabilities and other issues .
8 . control is the process of controlling who has access to certain systems , data , or physical locations .
9 . Data protection involves implementing measures to data from unauthorized access , use , disclosure , or destruction .
10 . A strong policy is an important part of data protection , as weak passwords can be easily guessed or hacked .

educaplay suscripción