This is the practice of protecting a network from unauthorized access or attacks.
network security
This tool scans your system to detect and remove viruses.
Antivirus software
The amount of money available for security tools.
Budget
An employee receives an email pretending to be their bank asking for login details.
Phishing
A harmful program designed to damage or disrupt systems.
Malware
This method scrambles data so only authorised users can read it.
Encryption
The size of a network and number of users.
network size/scale
A company installs software to block viruses on all computers.
Antivirus protection
A method used by attackers to trick users into giving personal information.
Phishing
This tool blocks unwanted traffic based on security rules.
Firewall
How sensitive or valuable the data is.
data sensitivity
A hacker guesses weak passwords to access accounts.
a brute force attack
A secret code used to protect data.
Password
This method requires users to verify identity in two steps (e.g. password + code).
two-factor authentication (2FA)
Rules or laws organisations must follow to protect data.
regulations/compliance
A business encrypts customer data to keep it safe.
encryption
A system that monitors and controls incoming and outgoing network traffic.
Firewall
This tool monitors networks to detect suspicious activity.
intrusion detection system (IDS)
The level of risk an organisation is willing to accept.
risk tolerance
A major company loses customer data due to a cyber attack.
data breach