1 | 14 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | 17 | ||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | 16 | ||||||||||||||||||||||||
7 | 8/9 | ||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 |
1. The process of dividing a computer network into smaller subnetworks for improved security and performance.
2. The process of securely exchanging keys between parties in asymmetric encryption.
3. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
4. The act of manipulating people into performing actions or divulging confidential information.
5. The process of filtering and validating user input before using it in an application.
6. An electronic document that confirms the credibility of a sender or receiver in a network communication.
7. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
8. The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft.
9. The process of converting plaintext into ciphertext using an encryption algorithm and a key.
10. Devices that have been compromised by malware and are part of a botnet.
11. A piece of information used to authenticate a user's identity, such as a password or biometric data.
12. Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system.
13. An attack where an attacker physically taps into a network cable to intercept data passing through.
14. A form of attack where an unauthorized party intercepts and monitors communication on a network.
15. Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network.
16. A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information.
17. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.