1 | 17 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3/4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
18 | |||||||||||||||||||||||||
15 | 19 | ||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
9 | 8 | ||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
1. A type of DDoS attack that uses amplification techniques to magnify the volume of traffic sent to a target, making the attack more effective.
2. A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information.
3. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
4. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
5. Security risks posed by individuals within an organization, such as employees or former employees.
6. A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic.
7. Malware that enables unauthorized access to a computer, while hiding its presence from the user and antivirus software.
8. A type of cyber attack that floods a computer network with excessive traffic in order to disrupt normal operations.
9. A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key.
10. Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network.
11. A type of malware that self-replicates and infects other files or systems.
12. Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.
13. A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.
14. The process of dividing a computer network into smaller subnetworks for improved security and performance.
15. The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft.
16. The process of converting a password into a fixed-length string of characters using a cryptographic algorithm.
17. Devices that have been compromised by malware and are part of a botnet.
18. A network of infected computers, or bots, that are controlled remotely and used to carry out DDoS attacks or other malicious activities.
19. A fraudulent site created to mimic a legitimate platform.