1 | 12 | ||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
2 | 14 | 15 | |||||||||||||||||||||||
11 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
1. A controlled attempt to exploit vulnerabilities in a network to assess its level of security.
2. The practice of restricting and managing user access to network resources based on predetermined security policies.
3. A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.
4. The process of reducing or eliminating the impact of a security incident or vulnerability by implementing preventive measures.
5. Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network.
6. The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft.
7. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
8. A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.
9. A secure network connection that allows remote users to access a private network over the internet securely.
10. Software designed to detect and remove malicious software, such as viruses, from computer systems.
11. The process of dividing a computer network into smaller subnetworks for improved security and performance.
12. A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.
13. A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.
14. A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service.
15. The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks.