CIA Triad - Confidentiality, Integrity, and Availability — the foundational principles of cybersecurity., Threat - Any potential danger that could exploit a vulnerability and cause harm., Vulnerability - A weakness that can be exploited by a threat actor., Risk - The likelihood or probability that a threat will exploit a vulnerability., Exploit - A method or code used by an attacker to take advantage of a vulnerability., Malware - Malicious software such as viruses, worms, trojans, and spyware., Ransomware - A type of malware that encrypts data and demands payment to restore it., Phishing - A deceptive attempt to steal information by posing as a trustworthy source., Social Engineering - Manipulating people into giving up confidential information or access., Insider Threat - A threat that originates from someone within the organization., Zero-Day - An unknown vulnerability that hasn't been patched yet., DDoS Attack - A Distributed Denial of Service attack; floods a service with traffic from many devices., Brute Force Attack - An attack that attempts all possible combinations to crack a password., Dictionary Attack - An attack using a list of known words to guess a password., Privilege Escalation - Gaining higher access or permissions than initially granted., Patch Management - The process of keeping software up to date to fix vulnerabilities., Encryption - The process of converting data into unreadable form to protect it., Symmetric Encryption - Encryption that uses the same key for both encryption and decryption., Asymmetric Encryption - Encryption that uses a pair of keys — public and private — to secure data., Public Key - A key that is shared publicly and used to encrypt messages., Private Key - A key that is kept secret and used to decrypt messages., Hashing - A process that converts data into a fixed-length value to ensure integrity., Digital Signature - A way to verify the origin and integrity of a message using encryption., MFA (Multi-Factor Authentication) - A security system that requires more than one method of authentication., Biometrics - Authentication based on a physical trait, such as a fingerprint or facial recognition., Firewall - A system that monitors and filters network traffic based on rules., IDS - An Intrusion Detection System that monitors traffic and alerts on suspicious activity., IPS - An Intrusion Prevention System that actively blocks detected threats., VPN - A Virtual Private Network that encrypts internet traffic between the user and the server., Proxy - A device or service that acts as an intermediary between users and the internet.,
0%
sec+ terms
Compartilhar
Compartilhar
Compartilhar
de
Danielpena4
Editar conteúdo
Imprimir
Incorporar
Mais
Atribuições
Ranking
Mostrar mais
Mostrar menos
Atualmente, este ranking é particular. Clique em
Compartilhar
para torná-lo público.
Este ranking foi desativado pelo proprietário do recurso.
Este ranking está desativado, pois suas opções e as do proprietário do recurso são diferentes.
Reverter opções
Associação
é um modelo aberto. Ele não gera pontuações para um ranking.
Login necessário
Estilo visual
Fontes
Assinatura necessária
Opções
Alterar modelo
Mostrar todos
Mais formatos serão exibidos à medida que você executar a atividade.
Resultados em aberto
Copiar link
Código QR
Excluir
Restaurar arquivo salvo automaticamente:
?