Social Engineering {Ans: Techniques that trick a person into disclosing confidential information}Computer Misuse Act {Ans: UK law governing criminal offences committed using a computer; unauthorised access to computer material, unauthorised access with intent to commit or facilitate commission of further offences, unauthorised acts with intent to impair operation of computer}Malicious Software {Ans: Software designed to harm a computer, such as Keyloggers, Adware, Ransomware, Trojans and Worms.}Configuration Problems {Ans: Many access points ship with no security configuration at all.}Intrusion Detection System {Ans: A computer program that senses when another computer is attempting to scan or access a computer or network.}Downloading Malicious content {Ans: When Malware is installed onto an organisation's system, usually unintentionally}What is Cross-site scripting? {Ans: Code injected by malicious web users into web pages viewed by other users.}Sabotage {Ans: When services are deliberately disrupted, through the use of DDoS attacks, spreading Malware or even physically destroying computer equipment.}What is an internal Security Threat? {Ans: An Internal Threat is a risk posed by employees at a company who could steal or damage data, or access and share data that they aren't supposed to access. This risk may not be intentional.}Private key