1. 4. the protection of internet-connected systems such as hardware, software and data from cyberthreats
  2. 5. engineering the term used for a broad range of malicious activities accomplished through human interactions.
  3. 6. testing an authorized simulated attack performed on a computer system to evaluate its security
  4. 7. category of malicious cyber-attacks that hackers or cybercriminals employ
  5. 8. information such as facts and numbers used to analyze something or make decisions
  6. 10. network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  1. 1. the measurement and statistical analysis of people's unique physical and behavioral characteristics
  2. 2. when attackers send malicious emails designed to trick people into falling for a scam
  3. 3. allow users to keep their software programs updated without having to check for and install available updates manually
  4. 9. software designed to interfere with a computer's normal functioning