Spyware, malicious software designed to monitor and collect data from a computer system without the user's knowledge or consent., Zero-Day Exploit, a malicious attack that exploits software or hardware vunerabilities that the vendor has not yet patched., Man in the Middle (MITM), an attack in which an attacker intercepts communication between two parties., Password Cracking, an attack in which an attacker attempts to access a user's account by guessing the user's password., Spoofing, an attack in which an attacker attempts to gain access to a computer system by pretending to be a legitimate user., Brute Force, an attack in which an attacker attempts to guess a user's password by trying every possible combination of characters. , Keylogger, a malware designed to capture keystrokes and other sensitive data., Crypto-Currency, digital currency that uses cryptography to secure transations, control the creation of additional units, and verify the transfer of assets., Firewall, a network security system that monitors and controls incoming and outgoing network traffic and protectsagainst unauthorised access. , Antivirus, a program that scans a computer system for viruses, malware, and other malicious programs., System Hardening, secures a system by reducing its attack surface and minimizing the potential for unauthorised access., Incident Response, responding to a security incident in an organisedand systematic manner..

Leaderboard

See top players

Leaderboard

Visual style

Options

Switch template

Leaderboard

See top players
)
Continue editing: ?