1/12 | 15 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | 16 | ||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
14 | 5 | ||||||||||||||||||||||||
13 | 17 | ||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
1. Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.
2. An attack where an attacker physically taps into a network cable to intercept data passing through.
3. A type of malicious software that can replicate itself and spread to other computers.
4. A method of social engineering where an unauthorized person follows an authorized individual to gain access to a restricted area.
5. Where an attacker uses a list of words, phrases, or commonly used passwords to attempt unauthorized access to a system.
6. A self-signed certificate issued by a Certificate Authority that establishes trust in the entire certificate chain.
7. A targeted form of phishing where attackers tailor fraudulent emails to specific individuals or organizations.
8. The act of manipulating people into performing actions or divulging confidential information.
9. A fraudulent site created to mimic a legitimate platform.
10. A popular asymmetric encryption algorithm used for secure communication and data protection.
11. A technique used in DDoS attacks where a large number of packets are sent to a target, overwhelming its capacity to process them.
12. A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.
13. A type of symmetric encryption algorithm that encrypts data one bit at a time.
14. Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
15. A cryptographic system that uses a pair of keys for encryption: a public key for encrypting data and a private key for decrypting data.
16. A type of symmetric encryption algorithm that operates on fixed-length blocks of data.
17. The process of filtering and validating user input before using it in an application.