1
2
3
100

A ______________ consists of two or more computers connected to share resources, exchange files or enable electronic communications.  

Network

100

malicious software that enters a user’s computer and then collects data from the device and the user and sends it to third parties without their consent

Spyware

100

It is a physical or wireless device that provides two-factor authentication (2FA) for users to prove their identity in a login process.

TOKEN

200

It is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.

virus

200

the practice of tricking Internet users (as through the use of deceptive email messages or websites) into revealing personal or confidential information which can then be used illicitly

Phishing

200

encryption of victims' sensitive data that attackers

Ransomware

300

 A__________ is any software designed to harm or exploit systems.

Malware

300

It is a set of established rules that specify how to format, send and receive data so that computer network endpoints, including computers, servers, routers and virtual machines, can communicate despite differences in their underlying infrastructures.

protocol

300

It is a software update designed to fix security vulnerabilities, improve functionality, or address bugs to protect systems from cyber threats.

Patch

400

A digital representation of a person

Identity

400

A ___________ is a security device or software that monitors and controls incoming and outgoing network traffic .

Firewall

400

It is the unauthorized access to a system or network for the purpose of stealing, altering, or damaging data and resources.

intrusion

500

An ______________ is a  form of data security in which information is converted to ciphertext.  

encryption

500

It is to  access to a system without authorization, to exploit vulnerabilities to steal or alter data. 

Hack

500

_____________ is when unauthorized access is gained to confidential data or systems, often leading to theft, exposure, or damage of sensitive information.

Breach