1 | 16 | 17 | 18 | ||||||||||||||||||||||
13 | |||||||||||||||||||||||||
14/15 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
11 | 3 | ||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | 12 | ||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
1. A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.
2. A protocol used for the transmission of data over the internet, often used to retrieve web pages and other resources.
3. A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service.
4. Homes that are equipped with various smart devices and appliances that can be controlled and automated through personal area networks.
5. The process of converting ciphertext into plaintext using a decryption algorithm and a key.
6. The arrangement of various elements of a computer network, such as computers, servers, routers, switches, etc., and the interconnections between them.
7. Preventing the sender from denying sending a message in asymmetric encryption.
8. A security protocol for wireless networks that provides data confidentiality and access control mechanisms.
9. A wireless network that uses satellites to provide coverage over large geographic areas, often used for communication in remote locations.
10. An organization that issues digital certificates and verifies the authenticity of entities.
11. The variation in latency or packet delay on a network.
12. The assurance that data has not been altered or tampered with.
13. The topmost DNS server in the hierarchical DNS system is the server at the highest level.
14. A networking device that forwards data packets between computer networks.
15. a device that forwards data packets between computer networks
16. In asymmetric encryption, a key that is kept secret and used for decryption.
17. The design of a network stack where different functions are organized into separate layers, each building on top of the lower layers.
18. The act of manipulating people into performing actions or divulging confidential information.