1. 3. A piece of software designed to remedy security vulnerabilities, or improve the usability or performance of software and computer equipment.
  2. 4. The assurance that systems and data are accessible and useable
  3. 5. A sequence of words used for authentication.
  4. 7. A method used to discover errors or potential security vulnerabilities in software.
  5. 8. A collection of private computers that are infected with malicious software that are being controlled without the owner’s knowledge.
  6. 9. Our hashtag
  7. 12. Measurable physical characteristics used to identify or verify an individual.
  8. 16. Data that is being communicated across a communication medium is said to be "in ____"
  9. 17. A sequence of characters used for authentication.
  10. 18. A computer that provides services to users or other systems.
  11. 21. A generic term for hardware which is used to store data.
  12. 22. A previously unknown, bug, flaw, or backdoor in software is known as a "____ day".
  13. 23. A user who can alter or circumvent a system’s controls is said to be "____"
  14. 24. The categorisation of systems and data according to the expected impact if it was to be compromised.
  15. 26. Malware used to gain access to a user’s systems and monitor their data, files, and behavior.
  16. 29. The use of different character sets, such as lower-case characters , upper-case characters , numeric characters and special characters increases as password's "____".
  17. 31. a form of malware that disguises itself as legitimate software but performs malicious activity when executed
  18. 33. Any circumstance or event with the potential to harm systems or data.
  19. 34. Descriptive data about the content and context used to identify data.
  20. 36. Measures used to protect the confidentiality, integrity and availability of systems and data.
  21. 37. A weakness in a system’s security requirements, design, implementation or operation that could be accidentally triggered or intentionally exploited and result in a violation of the system’s security policy.
  22. 39. The principle of restricting an individual’s access to only the data they require to fulfil the duties of their role.
  1. 1. Code that attempts to subvert the confidentiality, integrity or availability of a system is "____"
  2. 2. Verifying the identity of a user
  3. 6. email that falsely claims to be from a legitimate source, usually with a threat or request for information
  4. 9. A security process that uses an additional factor for verification is called "____ factor authentication"
  5. 10. An evident change to the normal behaviour of a network, system or user is called "an ____".
  6. 11. The assurance that data is disclosed only to authorised entities.
  7. 13. a type of malware that encrypts a victim’s information and demands payment in return for the decryption key
  8. 14. A senior executive who is responsible for cybersecurity
  9. 15. A network device that filters incoming and outgoing network data based on a series of rules.
  10. 19. Anything of value, such as computer equipment, software or data.
  11. 20. The act of exploiting human weaknesses to gain access to personal information and protected systems is called "____ engineering"
  12. 25. Software embedded in computer equipment.
  13. 27. The level of security risk to which a system is exposed.
  14. 28. These securely manage data flows between connected networks.
  15. 30. A tube, duct or pipe used to protect cables.
  16. 32. The assurance that data has been created, amended or deleted only by authorised individuals.
  17. 35. Data that resides on media or a system is said to be "at ____"
  18. 38. An individual that is authorised to access a system.