APPLICATION - Runs programs and services for users., NETWORK - Connects computers and devices together., DATABASE - Stores and organizes information in structured form., PHYSICAL - The tangible hardware components., DEVICES - Laptops, servers, and routers belong to this category., MEDIA - Refers to storage elements like USB, hard disk, or tapes., TOPOLOGIES - Defines secure layout such as star, mesh, or segmented network., INTRUSION - Detects suspicious or abnormal activities., BASELINE - Standard benchmark for secure system configuration., HARDENING - Strengthening software by patching and reducing vulnerabilities., FIREWALLS - Barrier system that filters traffic between networks., VPN - Creates secure encrypted tunnel for remote connection., IDS - System that monitors traffic for attacks or anomalies., HONEYPOT - Decoy system to trick attackers., DMZ - Isolated buffer zone between internal and external network., MONITORING - Tools for observing and analyzing network performance., ANTIVIRUS - Software that blocks, detects, and removes viruses., ANTISPYWARE - Program that prevents and removes spyware.,

CYBERSECURITY CHAPTER 3.1, 3.2, 3.3

Leaderboard

Visual style

Options

Switch template

Continue editing: ?