Relacionar Columnas Cyber security 1Versión en línea Matching game 1 por wayne hall 1 Hacktivist 2 Phisher 3 Cyber criminal 4 Anti-malware 5 Hacking 6 Mitigate 7 Denial of service 8 Inside 9 Botnet 10 Access management An individual that attempts to acquire personal information, often for malicious reasons, such as fraud, by pretending to be a known and trusted individual or organisation. An individual working inside an organisation, a trusted employee, who performs an illegal action, such as hacking. A method of gaining unauthorised access to a computer system/network. An attempt to disrupt a network/business/organisation by issuing more requests than a system is able to cope with, it can be performed with malicious intent or as a protest. An individual who gains unauthorised access to computer system/network for social or political purposes. To lessen an impact, for example, the impact of a cyber security incident or a risk. Software designed to prevent, detect and eradicate malicious software, such as a virus or a worm. A network of computers infected with malicious software and controlled without the owners’ knowledge, for example, to send spam or hoax emails. Managing the access to a computer system/network. It includes procedures such as account administration, account maintenance, account monitoring and the revocation of an account. An individual who commits illegal activities using computers and the Internet.