1 | 11 | 13 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4/9 | 10 | ||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
1. Where an attacker uses a list of words, phrases, or commonly used passwords to attempt unauthorized access to a system.
2. An electronic document that confirms the credibility of a sender or receiver in a network communication.
3. The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks.
4. A code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.
5. A piece of information used to authenticate a user's identity, such as a password or biometric data.
6. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
7. A cryptographic system that uses the same key for both encryption and decryption.
8. A technique used in DDoS attacks where a large number of packets are sent to a target, overwhelming its capacity to process them.
9. A targeted form of phishing where attackers tailor fraudulent emails to specific individuals or organizations.
10. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
11. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
12. An attack where an attacker physically taps into a network cable to intercept data passing through.
13. A type of DDoS attack that uses amplification techniques to magnify the volume of traffic sent to a target, making the attack more effective.