New Activity
Play Fill in the Blanks Game
( 1 ) We all know that 94% of organisations expect to implement ____________________ improvements to their computer systems .
You can use ____________________ transmission ( SSL ) to stop eavesdropping . You can buy ____________________ to protect your databases . But how to defend against a ? social ____________________ attack ? ?

( 2 ) Some methods of hacker attacks are as the following :
Exploits - using system bugs or glitches , e . g . :
Buffer ____________________
Input validation errors ( SQL and code injections , directory traversal )
Cross - site scripting
HTTP header injections

( 3 ) Some technical solutions in regard to security issues are as the follows :
Malware
proper ____________________ ( antivir software , good practice )
Securing the information in transit> encryption : SSL ? Secure Socket Layer
Securing the server and the data that are on it
restricted access
minimised number of services available
proper maintenance : ____________________ upgrades
using a ____________________

( 4 ) A Firewall is :
A Controlled Point of Access for All Traffic that ____________________ the Internal Network
A Controlled Point of Access for All Traffic that ____________________ the Internal Networ k