1 | 15 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 |
1. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
2. An attack where an attacker physically taps into a network cable to intercept data passing through.
3. Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.
4. The act of manipulating people into performing actions or divulging confidential information.
5. A controlled attempt to exploit vulnerabilities in a network to assess its level of security.
6. Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system.
7. A code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.
8. Where an attacker uses a list of words, phrases, or commonly used passwords to attempt unauthorized access to a system.
9. Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
10. A technique used in DDoS attacks where a large number of packets are sent to a target, overwhelming its capacity to process them.
11. Individuals or groups who control and manage botnets of infected devices.
12. Software that secretly gathers information about a person or organization without their knowledge, typically for malicious purposes.
13. Tricking users into believing that their communication is coming from a trusted source when it isn't.
14. Security risks posed by individuals within an organization, such as employees or former employees.
15. The process of filtering and validating user input before using it in an application.
16. A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service.