1/12 | |||||||||||||||||||||||||
2 | 16 | ||||||||||||||||||||||||
15 | 3 | ||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
14 | 5 | ||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7/13 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 |
1. A piece of information used to authenticate a user's identity, such as a password or biometric data.
2. Devices that have been compromised by malware and are part of a botnet.
3. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
4. A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key.
5. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
6. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.
7. In asymmetric encryption, a key that is kept secret and used for decryption.
8. An organization that issues digital certificates and verifies the authenticity of entities.
9. An electronic document that confirms the credibility of a sender or receiver in a network communication.
10. The process of converting ciphertext into plaintext using a decryption algorithm and a key.
11. A type of malware that disguises itself as a legitimate program but performs malicious activities in the background.
12. A software program designed to detect, prevent, and remove computer viruses and other malicious software.
13. In asymmetric encryption, a key that is publicly available and used for encryption.
14. Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
15. The process of verifying the identity of a user by requiring them to provide a password.
16. Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.