1 | 16 | ||||||||||||||||||||||||
2 | 3/18 | ||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | 17 | ||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8/14 | 15 | ||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 |
1. Where an attacker uses a list of words, phrases, or commonly used passwords to attempt unauthorized access to a system.
2. Individuals or groups who control and manage botnets of infected devices.
3. A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.
4. The process of filtering and validating user input before using it in an application.
5. A cryptographic technique that uses the same key to encrypt and decrypt data.
6. A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key.
7. A type of symmetric encryption algorithm that operates on fixed-length blocks of data.
8. A fraudulent site created to mimic a legitimate platform.
9. A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information.
10. A set of rules or steps used in encryption and decryption processes.
11. Devices that have been compromised by malware and are part of a botnet.
12. An attack where an attacker alters data or devices in a network to disrupt operations or gain unauthorized access.
13. The act of manipulating people into performing actions or divulging confidential information.
14. A cryptographic key that is kept secret and used for decryption or creating digital signatures.
15. Security risks posed by individuals within an organization, such as employees or former employees.
16. Verifying the identity of the sender or recipient in asymmetric encryption.
17. Computers that have been infected by malware and can be remotely controlled without the knowledge of their owners, often used in DDoS attacks.
18. A cryptographic key that can be freely distributed and is used for encryption or digital signatures.