Created by Corina August
over 1 year ago
|
||
cyber attack
attack waves
artificial intelligence
cyber operations
cyber virus
antivirus software
threat
data theft (information theft)
data transfer
information exchange
Cybercrime
Strategic Information Systems
Critical Infrastructure
advanced persistent threat
advanced persistent attack
IT engineer
to hack an account; to break into an account
to hack a system; to break into a system
electronic control
manual control
national cyber training exercise