1 | 13 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
10 | 14 | ||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
11 | 4 | ||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 |
1. Elevated permissions and rights granted to select users within an organization, increasing the risk of insider threats.
2. An attack where an attacker physically taps into a network cable to intercept data passing through.
3. A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.
4. A secure network connection that allows remote users to access a private network over the internet securely.
5. A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.
6. A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service.
7. Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.
8. A type of malicious software that can replicate itself and spread to other computers.
9. Devices that have been compromised by malware and are part of a botnet.
10. A technique used in DDoS attacks where a large number of packets are sent to a target, overwhelming its capacity to process them.
11. A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.
12. A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key.
13. A targeted form of phishing where attackers tailor fraudulent emails to specific individuals or organizations.
14. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.