Matching Pairs Cyber Risk Matching: Key Concepts and DescriptionsOnline version Match each cyber risk element with its brief description to reinforce understanding of security concepts. by Amar Ali 1 Staff interviews 2 Vulnerability scanning 3 Reviewing network logs 4 Phishing emails to staff 5 Legacy factory systems 6 Full risk assessment 7 Weak showroom Wi-Fi 8 Wireless auditing tools Leads to stolen credentials or data breaches Allows unauthorised access to the network Detects unusual or suspicious activity Check Wi-Fi strength and security settings Increases chance of system compromise Identifies weaknesses across all locations Reveal unsafe behaviours or misunderstandings Finds outdated or insecure software