A ______________ consists of two or more computers connected to share resources, exchange files or enable electronic communications.
Network
malicious software that enters a user’s computer and then collects data from the device and the user and sends it to third parties without their consent
Spyware
It is a physical or wireless device that provides two-factor authentication (2FA) for users to prove their identity in a login process.
TOKEN
It is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
virus
the practice of tricking Internet users (as through the use of deceptive email messages or websites) into revealing personal or confidential information which can then be used illicitly
Phishing
encryption of victims' sensitive data that attackers
Ransomware
A__________ is any software designed to harm or exploit systems.
Malware
It is a set of established rules that specify how to format, send and receive data so that computer network endpoints, including computers, servers, routers and virtual machines, can communicate despite differences in their underlying infrastructures.
protocol
It is a software update designed to fix security vulnerabilities, improve functionality, or address bugs to protect systems from cyber threats.
Patch
A digital representation of a person
Identity
A ___________ is a security device or software that monitors and controls incoming and outgoing network traffic .
Firewall
It is the unauthorized access to a system or network for the purpose of stealing, altering, or damaging data and resources.
intrusion
An ______________ is a form of data security in which information is converted to ciphertext.
encryption
It is to access to a system without authorization, to exploit vulnerabilities to steal or alter data.
Hack
_____________ is when unauthorized access is gained to confidential data or systems, often leading to theft, exposure, or damage of sensitive information.
Breach