1/11 | 13 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | 15 | ||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
6/7/12 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
1. Software designed to detect and remove malicious software, such as viruses, from computer systems.
2. The process of invalidating a digital certificate before its expiration date.
3. A piece of information used to authenticate a user's identity, such as a password or biometric data.
4. Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.
5. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
6. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
7. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
8. A code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.
9. The originating IP address or range from which traffic is allowed or denied.
10. A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.
11. A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.
12. Data packets flowing into and out of a network, which can be monitored and filtered for security purposes.
13. A secure network connection that allows remote users to access a private network over the internet securely.
14. Computers that have been infected by malware and can be remotely controlled without the knowledge of their owners, often used in DDoS attacks.
15. Predefined criteria that determine how traffic is allowed or denied through a firewall.