Compléter Data breaches - VOCABULARYVersion en ligne Data Protection - lesson 04 par Филипп Леонидович 1 hackers Hacking Malware Phishing Ransomware assessment firewall sensitive cyberattack leak vulnerability 1 . is one of the most common ways that cybercriminals gain unauthorized access to sensitive data . 2 . A can take many forms , such as malware infections , phishing scams , and denial - of - service attacks . 3 . The data breach was a result of a breach in the company's security systems , which allowed to access customer information . 4 . Exploiting a in software is one way that cybercriminals can gain access to sensitive data . 5 . A vulnerability can help identify weaknesses in a company's security systems that could lead to a data breach . 6 . The data was caused by a misconfigured server that allowed information to be accessible to the public . 7 . emails are a common tactic used by cybercriminals to trick people into revealing sensitive information . 8 . infections can be used to steal data , cause system damage , and facilitate cyberattacks . 9 . is a type of malware that encrypts data and demands payment in exchange for the decryption key . 10 . A is a network security system that monitors and controls incoming and outgoing network traffic . 2 theft engineering Encryption Patches Access authentication secure audit Incident password 1 . is a method of encoding data to protect it from unauthorized access . 2 . Two - factor is a security measure that requires users to provide two forms of identification before accessing a system . 3 . Identity is a type of crime where someone uses another person's personal information for fraudulent purposes . 4 . Social is a tactic used by cybercriminals to manipulate people into revealing sensitive information or performing actions that are harmful to the company . 5 . response is the process of reacting to and managing a data breach or other cybersecurity incident . 6 . A security is an evaluation of a company's security systems and procedures to identify potential vulnerabilities . 7 . are updates to software that address security vulnerabilities and other issues . 8 . control is the process of controlling who has access to certain systems , data , or physical locations . 9 . Data protection involves implementing measures to data from unauthorized access , use , disclosure , or destruction . 10 . A strong policy is an important part of data protection , as weak passwords can be easily guessed or hacked .