red team - A group that simulates attacks to test the effectiveness of an organization’s security., blue team - The defensive security team responsible for detecting, responding to, and defending against, white team - overseeing security tests and ensuring fair play between red and, purple team - red and blue teams, Packet filtering Firewall - Inspects packets at a basic level, filtering traffic based on source/destination IP addresses, ports, and protocols., Stateful Inspection Firewall - Monitors the state of active connections and makes decisions based on the state and context of traffic, Application Layer Firewall - Examines traffic at the application layer, allowing more specific control over HTTP, FTP, and other protocols, Intrusion Detection System - A system that monitors network traffic for suspicious activity and alerts administrators of potential attacks, Intrusion Prevention System - Similar to IDS but can actively block or prevent detected malicious activities in real time., Honey POT - A decoy system designed to attract and trap attackers to study their methods and gather intelligence., DMZ - A network segment that separates internal networks from external networks (like the internet), used to host public-facing services., VPN - A secure, encrypted connection over the internet that allows remote access to a private network., Symmetric Key Encryption: - The same key is used for both encryption and decryption, Asymmetric Key Encryption: - Uses a pair of keys (public and private) for encryption and decryption, Public Key Infrastructure (PKI): - A system that manages encryption keys and digital certificates to enable secure,, SSL/TLS and what it is mainly used for - Encrypts data transmitted over the internet, primarily used in securing,

순위표

비주얼 스타일

옵션

템플릿 전환하기

자동 저장된 게임을 복구할까요?