Créer jeu

COMPLETAR HUECOS SEGURIDAD INFORMÁTICA INGLÉS

Compléter

Completar los huecos con las palabras adecuadas

Téléchargez la version papier pour jouer

otros grado medio informatica Âge recommandé: 16 ans
58 fois fait

Créé par

Top 10 résultats

  1. 1
    PAU GARCIA CARDA
    04:09
    temps
    100
    but
  2. 2
    Martin
    Martin
    07:06
    temps
    90
    but
  3. 3
    kira
    kira
    02:43
    temps
    88
    but
  4. 4
    roxana matei
    roxana matei
    06:50
    temps
    74
    but
  5. 5
    roxana matei
    roxana matei
    00:32
    temps
    0
    but
Voulez-vous apparaître dans le Top 10 de ce jeu? Connectez-vous pour vous identifier.
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Créez compléter
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu
Créer un défi
  1. temps
    but
  1. temps
    but
temps
but
temps
but
game-icon

Completar

COMPLETAR HUECOS SEGURIDAD INFORMÁTICA INGLÉS

Completar los huecos con las palabras adecuadas

PAU GARCIA CARDA
game-qr
1

Smishing Vishing Hoax Spyware Botnet Trojan Ransomware Cryptojacking Adware Phishing

: False information shared to deceive or trick people .
: A harmful software disguised as something useful or legitimate .
: Software that secretly gathers information about a user's activities .
: Unwanted software that displays advertisements on a computer .
: Malicious software that encrypts files and demands payment for their release .
: A network of compromised computers controlled by a hacker .
: Attempt to trick people into sharing sensitive information by pretending to be a trustworthy source .
: Phishing attacks through SMS or text messages .
: Phishing attacks conducted over voice calls .
: Unauthorized use of someone else's computer to mine cryptocurrency .

2

Middle Netiquette Spam footprint Man in Grooming fake Deep Spoofing Hacker Baiting the Sniffer Digital

: Offering something enticing to manipulate users into taking a harmful action .
: A person who gains unauthorized access to computer systems .
: The trail of online activities and information left by a person .
: Faking the identity of a user or device to gain unauthorized access .
: A cyberattack where a third party intercepts communication between two parties .
: A tool that monitors and captures network traffic .
: Etiquette or manners in online communication .
: Artificially created media , often videos , that appear real but are manipulated .
: Building a relationship with the intent of exploiting or manipulating someone .
: Unwanted and irrelevant messages sent over the internet , usually in large quantities .