CIA Triad - Confidentiality, Integrity, and Availability — the foundational principles of cybersecurity., Threat - Any potential danger that could exploit a vulnerability and cause harm., Vulnerability - A weakness that can be exploited by a threat actor., Risk - The likelihood or probability that a threat will exploit a vulnerability., Exploit - A method or code used by an attacker to take advantage of a vulnerability., Malware - Malicious software such as viruses, worms, trojans, and spyware., Ransomware - A type of malware that encrypts data and demands payment to restore it., Phishing - A deceptive attempt to steal information by posing as a trustworthy source., Social Engineering - Manipulating people into giving up confidential information or access., Insider Threat - A threat that originates from someone within the organization., Zero-Day - An unknown vulnerability that hasn't been patched yet., DDoS Attack - A Distributed Denial of Service attack; floods a service with traffic from many devices., Brute Force Attack - An attack that attempts all possible combinations to crack a password., Dictionary Attack - An attack using a list of known words to guess a password., Privilege Escalation - Gaining higher access or permissions than initially granted., Patch Management - The process of keeping software up to date to fix vulnerabilities., Encryption - The process of converting data into unreadable form to protect it., Symmetric Encryption - Encryption that uses the same key for both encryption and decryption., Asymmetric Encryption - Encryption that uses a pair of keys — public and private — to secure data., Public Key - A key that is shared publicly and used to encrypt messages., Private Key - A key that is kept secret and used to decrypt messages., Hashing - A process that converts data into a fixed-length value to ensure integrity., Digital Signature - A way to verify the origin and integrity of a message using encryption., MFA (Multi-Factor Authentication) - A security system that requires more than one method of authentication., Biometrics - Authentication based on a physical trait, such as a fingerprint or facial recognition., Firewall - A system that monitors and filters network traffic based on rules., IDS - An Intrusion Detection System that monitors traffic and alerts on suspicious activity., IPS - An Intrusion Prevention System that actively blocks detected threats., VPN - A Virtual Private Network that encrypts internet traffic between the user and the server., Proxy - A device or service that acts as an intermediary between users and the internet.,
0%
sec+ terms
Partager
Partager
Partager
par
Danielpena4
Modifier le contenu
Imprimer
Incorporer
Plus
Affectations
Classement
Afficher plus
Afficher moins
Ce classement est actuellement privé. Cliquez sur
Partager
pour le rendre public.
Ce classement a été désactivé par le propriétaire de la ressource.
Ce classement est désactivé car vos options sont différentes pour le propriétaire de la ressource.
Rétablir les Options
Apparier
est un modèle à composition non limitée. Il ne génère pas de points pour un classement.
Connexion requise
Style visuel
Polices
Abonnement requis
Options
Changer de modèle
Afficher tout
D'autres formats apparaîtront au fur et à mesure que vous jouerez l'activité.
Ouvrir les résultats
Copier le lien
Code QR
Supprimer
Restauration auto-sauvegardé :
?