1/16 | 18 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
19 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
5 | 4 | ||||||||||||||||||||||||
6 | 17 | ||||||||||||||||||||||||
15 | 7 | ||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
14 |
1. Elevated permissions and rights granted to select users within an organization, increasing the risk of insider threats.
2. Malware that secretly gathers information about a person or organization without their consent.
3. A self-signed certificate issued by a Certificate Authority that establishes trust in the entire certificate chain.
4. Ensuring that information remains confidential in asymmetric encryption.
5. Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
6. A type of malware that disguises itself as a legitimate program but performs malicious activities in the background.
7. The process of invalidating a digital certificate before its expiration date due to compromise or other reasons.
8. A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key.
9. A code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.
10. A type of symmetric encryption algorithm that operates on fixed-length blocks of data.
11. Devices that have been compromised by malware and are part of a botnet.
12. Computers that have been infected by malware and can be remotely controlled without the knowledge of their owners, often used in DDoS attacks.
13. A method of social engineering where an unauthorized person follows an authorized individual to gain access to a restricted area.
14. A form of attack where an unauthorized party intercepts and monitors communication on a network.
15. A cryptographic technique used to verify the authenticity of digital messages or documents.
16. A cryptographic key that is kept secret and used for decryption or creating digital signatures.
17. A popular asymmetric encryption algorithm used for secure communication and data protection.
18. A type of symmetric encryption algorithm that encrypts data one bit at a time.
19. A social engineering technique that involves offering something enticing to trick individuals into revealing information or taking action.