1 | 12 | ||||||||||||||||||||||||
15 | 17 | ||||||||||||||||||||||||
2 | 18 | ||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | 13 | 16 | |||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | 14 | ||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
1. Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
2. The process of reducing or eliminating the impact of a security incident or vulnerability by implementing preventive measures.
3. The act of manipulating people into performing actions or divulging confidential information.
4. Individuals or groups who control and manage botnets of infected devices.
5. A type of malware that disguises itself as a legitimate program but performs malicious activities in the background.
6. Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network.
7. A method of social engineering where an unauthorized person follows an authorized individual to gain access to a restricted area.
8. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
9. A technique used in DDoS attacks where a large number of packets are sent to a target, overwhelming its capacity to process them.
10. A cryptographic system that uses the same key for both encryption and decryption.
11. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.
12. A form of attack where an unauthorized party intercepts and monitors communication on a network.
13. Malware that enables unauthorized access to a computer, while hiding its presence from the user and antivirus software.
14. Security risks posed by individuals within an organization, such as employees or former employees.
15. A network of infected computers, or bots, that are controlled remotely and used to carry out DDoS attacks or other malicious activities.
16. The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.
17. The process of verifying the identity of a user by requiring them to provide a password.
18. Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.