1 | 13 | 15 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | 14 | 16 | |||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
1. A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.
2. Where an attacker uses a list of words, phrases, or commonly used passwords to attempt unauthorized access to a system.
3. The process of filtering and validating user input before using it in an application.
4. A form of attack where an unauthorized party intercepts and monitors communication on a network.
5. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
6. In asymmetric encryption, a key that is publicly available and used for encryption.
7. The process of verifying that a network operates efficiently and satisfies the intended performance standards.
8. A type of malware that disguises itself as a legitimate program but performs malicious activities in the background.
9. Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.
10. A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.
11. Computers that have been infected by malware and can be remotely controlled without the knowledge of their owners, often used in DDoS attacks.
12. Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
13. Information used to authenticate a user's identity, typically consisting of a username and password.
14. An attack where an attacker physically taps into a network cable to intercept data passing through.
15. The process of dividing a computer network into smaller subnetworks for improved security and performance.
16. Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system.