1 | 11 | ||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | 10 | ||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 |
1. A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.
2. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
3. The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks.
4. A type of DDoS attack that uses amplification techniques to magnify the volume of traffic sent to a target, making the attack more effective.
5. A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information.
6. Where an attacker uses a list of words, phrases, or commonly used passwords to attempt unauthorized access to a system.
7. Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system.
8. A type of malicious software that can replicate itself and spread to other computers.
9. A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.
10. The process of dividing a computer network into smaller subnetworks for improved security and performance.
11. A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.
12. A controlled attempt to exploit vulnerabilities in a network to assess its level of security.
13. Elevated permissions and rights granted to select users within an organization, increasing the risk of insider threats.