1) Identity theft, stealing money, stealing private information, controlling private computers. a) cybercrime b) counterfeiting c) cyberbullying 2) The usage of deceptive emails and websites to maliciously gather personal information a) Phishing b) counterfeiting c) malware 3) ________ is a type cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid. a) Ransomware b) malware c) counterfeiting 4) Protection of computer systems, networks, and data from digital attacks. a) Cybersecurity b) malware c) harddrive 5) The ________ (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data. a) Internet of Things b) network c) token ring

05.25.22 Do Now U10L2 Impact of Cybersecurity

排行榜

视觉风格

选项

切换模板

恢复自动保存: