1 | 13 | ||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
2 | 16 | ||||||||||||||||||||||||
3/10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
4 | 14 | ||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 |
1. A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.
2. Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system.
3. In asymmetric encryption, a key that is publicly available and used for encryption.
4. A pair of cryptographic keys, consisting of a public key and a private key.
5. Security risks posed by individuals within an organization, such as employees or former employees.
6. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.
7. The process of invalidating a digital certificate before its expiration date.
8. A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information.
9. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
10. A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.
11. An electronic document that confirms the credibility of a sender or receiver in a network communication.
12. An attack where an attacker physically taps into a network cable to intercept data passing through.
13. Malware that enables unauthorized access to a computer, while hiding its presence from the user and antivirus software.
14. The process of converting plaintext into ciphertext using an encryption algorithm and a key.
15. The process of converting a password into a fixed-length string of characters using a cryptographic algorithm.
16. Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network.
17. Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.