1. They are side effects of the freedom and ease of communicating online and therefore…
2. An example of social engineering is:
3. A example of a network policy that may help with security is:
4. Malware is a manufacturer of corrupt (but cheap) computer parts
8. Networks like the internet are wonderful inventions and they are risk-free and completely safe.
9. The security that is associated with networks and particularly the internet is called:
10. One method of data interception is:
11. White box testing assumes knowledge of the internals of the systems.
12. Pharming is terrifying because the email can be legitimate but clicking on the link takes you to a hacker's website. How?
13. ____________ is when the perpetrator obtains information while watching you use the device they want access to.
14. Baiting is like the real-world Trojan horse that uses physical media and relies on the _____________ of the victim
15. Organisations can reduce their security risks by:
16. An example of blagging is a hacker calling a company and pretending to be their network manager.
17. The attacks used in social engineering can be used to steal employees' confidential information. One common type of social engineering …
18. Another example of social engineering is a criminal posing as exterminators, fire marshals and technicians to go unnoticed and…
19. Spyware are programs that inject adverts into pages and programs on your computer with the aim that the hacker gets advertising revenue
20. Spyware gathers data about people without their knowledge, including sensitive data like passwords
21. You can minimise the risk of malware by:
22. Some spyware can even use your laptop or comptuer's webcam without your knowledge!
23. The following list are methods that ….
24. A common form of biometric security scanning used in school canteens and mobile phones is:
25. A longer password is always better in terms of a hacker being able to brute force hack it.