Complete the sentences by filling in the blanks. Each correct answer earns points!
is the process of protecting software, systems, and networks from threats that cause unauthorized disclosure, theft, damage, or service disruption.
Context: Computer Security (Cybersecurity) Scope
A is a flaw that compromises security, but an exploitable vulnerability has at least one working exploit.
Context: Vulnerability vs exploitable vulnerability
Most discovered vulnerabilities are documented in the database.
Context: CVE database
Threat actors can exploit the system if the vulnerability is , because at least one working exploit exists.
Context: Exploitable vulnerability
A is a secret method that bypasses normal authentication or security controls, often hidden in code or firmware.
Context: Backdoors
Backdoor is present (secret bypass of authentication/security controls) â attackers can gain remote administrative access and the system.
Context: Backdoor causeâeffect relationship
Malware can install backdoors, enabling attackers to modify files, steal information, install unwanted software, and take control.
Context: Backdoor-enabled remote control
Denial-of-service traffic overwhelms resources or locks accounts â users cannot access intended .
Context: DoS causeâeffect relationship
uses many points to block users at once, making defense harder than single-source blocking.
Context: DoS vs DDoS
Eavesdropping occurs on unsecured or unencrypted network traffic â sensitive data can be intercepted and later .
Context: Eavesdropping causeâeffect relationship
Unlike many malware attacks, eavesdropping may not noticeably degrade performance, making detection .
Context: Eavesdropping detection difficulty
Phishing deceives users into entering credentials on a fake site â attackers can access the victimâs real .
Context: Phishing causeâeffect relationship
is deceiving users to obtain sensitive information like usernames, passwords, or credit card details.
Context: Phishing as social engineering
SMBs are more likely to face malware, ransomware, phishing, man-in-the-middle attacks, and attacks.
Context: Threat actor target differences (SMBs)