Network Validation | Authentication |
Network Security | Digital Certificate |
Biometric Authentication | Access Control |
Two-Factor Authentication | Intrusion Detection System |
The act of confirming the identity of a user or device, with the purpose of granting access to a network or system. | The process of verifying that a network operates efficiently and satisfies the intended performance standards. |
An electronic document that confirms the credibility of a sender or receiver in a network communication. | Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service. |
It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network. | Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication. |
A monitoring solution, whether it's in the form of software or hardware, which oversees network traffic to acknowledge and take action against potential security threats or attacks. | A security process necessitating users to provide two distinct authentication factors, often a password and a unique code. |
Firewall | Security Audit |
Password Authentication | Credentials |
Authentication Factor | Hashing |
Salt | Phishing |
The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements. | A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic. |
Information used to authenticate a user's identity, typically consisting of a username and password. | The process of verifying the identity of a user by requiring them to provide a password. |
The process of converting a password into a fixed-length string of characters using a cryptographic algorithm. | A piece of information used to authenticate a user's identity, such as a password or biometric data. |
A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity. | A random string of characters added to a password before hashing to protect against rainbow table attacks. |
Asymmetric Encryption | Symmetric Encryption |
Public Key | Private Key |
Key Exchange | Encryption |
Decryption | Certificate Authority |
A cryptographic system that uses the same key for both encryption and decryption. | A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption. |
In asymmetric encryption, a key that is kept secret and used for decryption. | In asymmetric encryption, a key that is publicly available and used for encryption. |
The process of converting plaintext into ciphertext using an encryption algorithm and a key. | The process of securely exchanging keys between parties in asymmetric encryption. |
An organization that issues digital certificates and verifies the authenticity of entities. | The process of converting ciphertext into plaintext using a decryption algorithm and a key. |
Digital Signature | Certificate Revocation |
Key Pair | Computer Virus |
Antivirus | Trojan Horse |
Worm | Ransomware |
The process of invalidating a digital certificate before its expiration date. | A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents. |
A type of malicious software that can replicate itself and spread to other computers. | A pair of cryptographic keys, consisting of a public key and a private key. |
A type of malware that disguises itself as a legitimate program but performs malicious activities in the background. | A software program designed to detect, prevent, and remove computer viruses and other malicious software. |
A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key. | A self-replicating program that spreads across computer networks and can cause harm by consuming system resources or deleting files. |
Malware | Virus |
Trojan | Spyware |
Adware | Rootkit |
Keylogger | Spoofing |
A type of malware that self-replicates and infects other files or systems. | Malicious software designed to harm or exploit computers or networks. |
Malware that secretly gathers information about a person or organization without their consent. | A type of malware disguised as legitimate software, which allows unauthorized access to a computer or network. |
Malware that enables unauthorized access to a computer, while hiding its presence from the user and antivirus software. | Malware that displays unwanted advertisements or redirects browsers to advertising websites. |
Tricking users into believing that their communication is coming from a trusted source when it isn't. | Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information. |
Phishing Website | Ddos Attack |
Zombie Computers | Amplification Attack |
Packet Flooding | Brute Force Attacks |
Dictionary Attack | SQL Injection |
A type of cyber attack that floods a computer network with excessive traffic in order to disrupt normal operations. | A fraudulent site created to mimic a legitimate platform. |
A type of DDoS attack that uses amplification techniques to magnify the volume of traffic sent to a target, making the attack more effective. | Computers that have been infected by malware and can be remotely controlled without the knowledge of their owners, often used in DDoS attacks. |
Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system. | A technique used in DDoS attacks where a large number of packets are sent to a target, overwhelming its capacity to process them. |
A code injection technique that attackers use to exploit vulnerabilities in a web application's database layer. | Where an attacker uses a list of words, phrases, or commonly used passwords to attempt unauthorized access to a system. |
Input Sanitation | Insider Threats |
Privileged Access | Social Engineering |
Pretexting | Baiting |
Tailgating | Impersonation |
Security risks posed by individuals within an organization, such as employees or former employees. | The process of filtering and validating user input before using it in an application. |
The act of manipulating people into performing actions or divulging confidential information. | Elevated permissions and rights granted to select users within an organization, increasing the risk of insider threats. |
A social engineering technique that involves offering something enticing to trick individuals into revealing information or taking action. | A form of social engineering where attackers create a fictitious scenario to obtain information from individuals. |
A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information. | A method of social engineering where an unauthorized person follows an authorized individual to gain access to a restricted area. |
Spear Phishing | Physical System Attacks |
Eavesdropping | Tampering |
Physical Tapping | Botnet |
Command And Control Server | Infected Devices |
Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply. | A targeted form of phishing where attackers tailor fraudulent emails to specific individuals or organizations. |
An attack where an attacker alters data or devices in a network to disrupt operations or gain unauthorized access. | A form of attack where an unauthorized party intercepts and monitors communication on a network. |
A network of infected computers, or bots, that are controlled remotely and used to carry out DDoS attacks or other malicious activities. | An attack where an attacker physically taps into a network cable to intercept data passing through. |
Devices that have been compromised by malware and are part of a botnet. | A central server that sends instructions to the devices in a botnet and receives data back from them. |
Bot Herders | |
Individuals or groups who control and manage botnets of infected devices. | |