Relacionar Columnas Cyber security 1Versión en línea Matching game 1 por wayne hall 1 Hacktivist 2 Inside 3 Access management 4 Phisher 5 Anti-malware 6 Denial of service 7 Mitigate 8 Cyber criminal 9 Hacking 10 Botnet A method of gaining unauthorised access to a computer system/network. To lessen an impact, for example, the impact of a cyber security incident or a risk. An attempt to disrupt a network/business/organisation by issuing more requests than a system is able to cope with, it can be performed with malicious intent or as a protest. An individual who commits illegal activities using computers and the Internet. A network of computers infected with malicious software and controlled without the owners’ knowledge, for example, to send spam or hoax emails. Software designed to prevent, detect and eradicate malicious software, such as a virus or a worm. Managing the access to a computer system/network. It includes procedures such as account administration, account maintenance, account monitoring and the revocation of an account. An individual who gains unauthorised access to computer system/network for social or political purposes. An individual working inside an organisation, a trusted employee, who performs an illegal action, such as hacking. An individual that attempts to acquire personal information, often for malicious reasons, such as fraud, by pretending to be a known and trusted individual or organisation.