(
1
)
We
all
know
that
94%
of
organisations
expect
to
implement
____________________
improvements
to
their
computer
systems
.
You
can
use
____________________
transmission
(
SSL
)
to
stop
eavesdropping
.
You
can
buy
____________________
to
protect
your
databases
.
But
how
to
defend
against
a
?
social
____________________
attack
?
?
(
2
)
Some
methods
of
hacker
attacks
are
as
the
following
:
Exploits
-
using
system
bugs
or
glitches
,
e
.
g
.
:
Buffer
____________________
Input
validation
errors
(
SQL
and
code
injections
,
directory
traversal
)
Cross
-
site
scripting
HTTP
header
injections
(
3
)
Some
technical
solutions
in
regard
to
security
issues
are
as
the
follows
:
Malware
proper
____________________
(
antivir
software
,
good
practice
)
Securing
the
information
in
transit>
encryption
:
SSL
?
Secure
Socket
Layer
Securing
the
server
and
the
data
that
are
on
it
restricted
access
minimised
number
of
services
available
proper
maintenance
:
____________________
upgrades
using
a
____________________
(
4
)
A
Firewall
is
:
A
Controlled
Point
of
Access
for
All
Traffic
that
____________________
the
Internal
Network
A
Controlled
Point
of
Access
for
All
Traffic
that
____________________
the
Internal
Networ
k