1 | 12 | ||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
1. A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.
2. The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft.
3. The practice of restricting and managing user access to network resources based on predetermined security policies.
4. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
5. A secure network connection that allows remote users to access a private network over the internet securely.
6. Software designed to detect and remove malicious software, such as viruses, from computer systems.
7. A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.
8. The process of dividing a computer network into smaller subnetworks for improved security and performance.
9. A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.
10. The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks.
11. A controlled attempt to exploit vulnerabilities in a network to assess its level of security.
12. A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service.
13. A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.