1) Identity theft, stealing money, stealing private information, controlling private computers. a) cybercrime b) counterfeiting c) cyberbullying 2) The usage of deceptive emails and websites to maliciously gather personal information a) Phishing b) counterfeiting c) malware 3) ________ is a type cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid. a) Ransomware b) malware c) counterfeiting 4) Protection of computer systems, networks, and data from digital attacks. a) Cybersecurity b) malware c) harddrive 5) The ________ (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data. a) Internet of Things b) network c) token ring

05.25.22 Do Now U10L2 Impact of Cybersecurity

от

Табло

Визуален стил

Опции

Шаблон за превключване

Възстановяване на авто-записаната: ?