Note that your final mark will not be saved in the system.
Cyber Security GapFill
You must fill all the gaps before clicking ‘Check Answers!’
is any attempt to gain unauthorised access to a computer system, and can target either a computer system itself or the system's users. Attacks on a computer system include the use of malware, interception and brute-force attacks. Attacks on users, also known as , involve trying to exploit the user rather than the system using techniques such as and . Malware is malicious software designed to . Anti-malware software is used to malware on the system. Interception is the process of .
The threat of data being intercepted can be reduced by the data so that if it is intercepted it cannot be read. attacks involve repeatedly guessing a password until access is granted to the system, attacks work in a very similar way but use list of commonly used passwords or standard words in a dictionary.
Systems can be made secure by using to identify security flaws by attempting to hack into the system. To protect against social engineering attacks, organisations can give their employees specific training on the steps to be taken to avoid attacks. Setting up can also help to reduce the impact of any attacks that occur, as if a hacker manages to get an employee's password, they will only be able to access part of the system.