1/10 | 12 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3/4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
11 | 13 | ||||||||||||||||||||||||
6/14 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
1. Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.
2. The process of invalidating a digital certificate before its expiration date.
3. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
4. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
5. An organization that issues digital certificates and verifies the authenticity of entities.
6. Predefined criteria that determine how traffic is allowed or denied through a firewall.
7. A type of malicious software that can replicate itself and spread to other computers.
8. A secure network connection that allows remote users to access a private network over the internet securely.
9. Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.
10. These firewalls act as intermediaries between users and the services they access, offering additional features like content filtering, logging, and anonymity through request and response management.
11. A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information.
12. A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.
13. The process of reducing or eliminating the impact of a security incident or vulnerability by implementing preventive measures.
14. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.