Firewall | Antivirus |
Intrusion Detection System | Encryption |
Virtual Private Network | Two-Factor Authentication |
Access Control | Intrusion Prevention System |
Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network. | A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. |
The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft. | A system that monitors network traffic to identify and respond to unauthorized access attempts or malicious activities. |
A security measure that requires users to provide two separate forms of identification, typically a password and a unique code, to access a network or system. | A secure network connection that allows remote users to access a private network over the internet securely. |
A network security device that monitors and blocks malicious activities and prevents potential network attacks. | The practice of restricting and managing user access to network resources based on predetermined security policies. |
Vulnerability Scanning | Security Policy |
Antivirus Software | Network Segmentation |
Network Security Audit | Penetration Testing |
Acceptable Use Policy | User Agreement |
A documented set of rules and procedures that define the organization's approach to network security and guide security implementations. | The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks. |
The process of dividing a computer network into smaller subnetworks for improved security and performance. | Software designed to detect and remove malicious software, such as viruses, from computer systems. |
A controlled attempt to exploit vulnerabilities in a network to assess its level of security. | A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks. |
A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service. | A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service. |
Internet Usage Policy | Incident Response Plan |
Mitigation | Computer Virus |
Trojan Horse | Worm |
Ransomware | Malware |
A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents. | A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources. |
A type of malicious software that can replicate itself and spread to other computers. | The process of reducing or eliminating the impact of a security incident or vulnerability by implementing preventive measures. |
A self-replicating program that spreads across computer networks and can cause harm by consuming system resources or deleting files. | A type of malware that disguises itself as a legitimate program but performs malicious activities in the background. |
Malicious software designed to harm or exploit computers or networks. | A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key. |
Virus | Trojan |
Spyware | Adware |
Rootkit | Keylogger |
Phishing | Spoofing |
A type of malware disguised as legitimate software, which allows unauthorized access to a computer or network. | A type of malware that self-replicates and infects other files or systems. |
Malware that displays unwanted advertisements or redirects browsers to advertising websites. | Malware that secretly gathers information about a person or organization without their consent. |
Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information. | Malware that enables unauthorized access to a computer, while hiding its presence from the user and antivirus software. |
Tricking users into believing that their communication is coming from a trusted source when it isn't. | A technique used by cybercriminals to trick individuals into revealing sensitive information by posing as a trustworthy entity. |
Phishing Website | Ddos Attack |
Zombie Computers | Amplification Attack |
Packet Flooding | Brute Force Attacks |
Dictionary Attack | SQL Injection |
A type of cyber attack that floods a computer network with excessive traffic in order to disrupt normal operations. | A fraudulent site created to mimic a legitimate platform. |
A type of DDoS attack that uses amplification techniques to magnify the volume of traffic sent to a target, making the attack more effective. | Computers that have been infected by malware and can be remotely controlled without the knowledge of their owners, often used in DDoS attacks. |
Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system. | A technique used in DDoS attacks where a large number of packets are sent to a target, overwhelming its capacity to process them. |
A code injection technique that attackers use to exploit vulnerabilities in a web application's database layer. | Where an attacker uses a list of words, phrases, or commonly used passwords to attempt unauthorized access to a system. |
Input Sanitation | Insider Threats |
Privileged Access | Social Engineering |
Pretexting | Baiting |
Tailgating | Impersonation |
Security risks posed by individuals within an organization, such as employees or former employees. | The process of filtering and validating user input before using it in an application. |
The act of manipulating people into performing actions or divulging confidential information. | Elevated permissions and rights granted to select users within an organization, increasing the risk of insider threats. |
A social engineering technique that involves offering something enticing to trick individuals into revealing information or taking action. | A form of social engineering where attackers create a fictitious scenario to obtain information from individuals. |
A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information. | A method of social engineering where an unauthorized person follows an authorized individual to gain access to a restricted area. |
Spear Phishing | Physical System Attacks |
Eavesdropping | Tampering |
Physical Tapping | Botnet |
Command And Control Server | Infected Devices |
Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply. | A targeted form of phishing where attackers tailor fraudulent emails to specific individuals or organizations. |
An attack where an attacker alters data or devices in a network to disrupt operations or gain unauthorized access. | A form of attack where an unauthorized party intercepts and monitors communication on a network. |
A network of infected computers, or bots, that are controlled remotely and used to carry out DDoS attacks or other malicious activities. | An attack where an attacker physically taps into a network cable to intercept data passing through. |
Devices that have been compromised by malware and are part of a botnet. | A central server that sends instructions to the devices in a botnet and receives data back from them. |
Bot Herders | |
Individuals or groups who control and manage botnets of infected devices. | |