sophisticated, Having a high degree of complexity, knowledge, or experience (e.g., a highly planned and complex cyber attack)., A term describing a very basic operating system designed for end-point devices with limited processing power., spyware, A communication protocol used to encrypt data between a client and a server to prevent network eavesdropping., Malicious software installed on a device that secretly gathers information about the user (like keystrokes or browsing history)., Identity Theft, The criminal act of acquiring and using another person's personal information (like an ID number or passwords) for fraudulent purposes., A situation where a hardware device identifies itself on the network with a duplicate MAC address, causing topology conflicts., Digital Footprint, A biometric security tool used to scan physical fingerprints for access control to server rooms., The trail of data, actions, and information a user leaves behind as a result of their online activity., Privacy Protection, Measures, standards, and policies designed to ensure a user's personal information is kept safe from unauthorized access or misuse., An object-oriented programming feature that prevents writing SQL commands directly into a database schema., Two-factor authentication, A security mechanism that requires the user to provide two different forms of identification (e.g., a password and a one-time SMS code) to access an account., A redundancy process where two identical backup copies of a database are created on two separate servers to prevent data loss., Identity Thieves, Automated algorithms responsible for recovering hacked accounts for users who have lost their login credentials., Criminals or cyber attackers who obtain the sensitive personal information of others and use it to impersonate them for profit., Phishing, A fraudulent method where an attacker sends a message masquerading as a trusted entity to trick the victim into revealing sensitive information or clicking a malicious link., A type of automated port scanning used to map vulnerabilities and open ports in enterprise edge routers., Wardialing, An older technique using software to automatically dial a large sequence of phone numbers to find unsecured modems or computers to connect to., A dynamic routing protocol designed to securely connect multiple remote Local Area Networks (LANs)., Smishing, A process where a victim's files are maliciously encrypted, and a ransom is demanded to release the decryption key., A specific type of phishing attack executed through fraudulent text messages (SMS) sent to a mobile device., Python, A popular, high-level programming language known for its readability, heavily used in development, network automation, and cybersecurity., A type of physical physical cable used to transmit data at ultra-high speeds between switches inside a server rack., Protocol, A set of rules and standards that strictly define how computers or network devices communicate and transmit data between them (e.g., TCP or UDP)., An internal hardware component responsible for distributing electrical loads between the CPU and RAM., Firewall, A debugging tool designed to detect and fix logic bugs in C++ code during compilation., A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules to block unauthorized access., Packet, A small segment of data generated by breaking down a larger message, formatted for efficient transmission over a network (like an IP network)., A specialized memory buffer within a network switch used exclusively to store routing tables., Topology, A cryptographic hashing standard used to establish secure VPN tunnels between remote branches., The structural layout or arrangement of a network, describing how different nodes and devices are physically or logically connected (e.g., Star, Mesh, or Ring)., Endpoint, Any physical device that connects to a computer network and communicates across it, such as a laptop, smartphone, or server., The specific designated port on a firewall that is intentionally left open to act as a honeypot for attackers., Scalability, A vulnerability metric that measures how easily a cyber attacker can escalate privileges from a standard user to a root administrator., The ability of a system, network, or application to seamlessly handle an increasing amount of work, or its capacity to be expanded to accommodate growth., Ransomware, A specialized cryptographic protocol used by network administrators to securely archive, compress, and lock outdated server logs., A type of malicious software that encrypts a victim's files or completely locks them out of their device, demanding a financial payment to restore access..

Výsledková tabule/Žebříček

Vizuální styl

Možnosti

Přepnout šablonu

)
Obnovit automatické uložení: ?