1 | 14 | ||||||||||||||||||||||||
2 | 3 | ||||||||||||||||||||||||
13 | 17 | ||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | 8 | ||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
1. The process of invalidating a digital certificate before its expiration date.
2. A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.
3. A cryptographic system that uses the same key for both encryption and decryption.
4. A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.
5. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
6. The process of verifying the identity of a user by requiring them to provide a password.
7. A type of cyber attack that floods a computer network with excessive traffic in order to disrupt normal operations.
8. A type of malware that disguises itself as a legitimate program but performs malicious activities in the background.
9. The process of filtering and validating user input before using it in an application.
10. The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft.
11. The process of dividing a computer network into smaller subnetworks for improved security and performance.
12. The process of securely exchanging keys between parties in asymmetric encryption.
13. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
14. Software designed to detect and remove malicious software, such as viruses, from computer systems.
15. A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key.
16. A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.
17. A type of malicious software that can replicate itself and spread to other computers.