This device is used to monitor and filter incoming and out going network traffic based on predetermined security rules.
What is a firewall
This algorithm, created by the NSA is a standard for encrypting and decrypting digital data
What is AES (Advanced Encryption Standard)
This type of malware encrypts a users' files and demands payment for the decrypting key.
What is ransomware
This type of attack involves inserting malicious scripts into a website, which are then executed in the user's browsers
This principle states that users should have only the minimum level of access necessary to perform their job functions
What is the principle of least privilege
This protocol, often associated with port 443, is used to secure communications over a computer network
What is HTTPS (Hypertext Transfer Protocol Sercure)
This cryptographic concept ensures that a message has not been altered during transmission
What is integrity
This type of malware disguised itself as legitimate software but preforms malicious actions once executed
What is a Trojan Horse
This type of web vulnerability allows attackers to execute arbitrary SQL code on a database
What is SQL Injection
This type of social engineering attack tricks users into revealing sensitive information by pretending to be a legitimate entity
What is Phishing
This type of attack involves overwhelming a network with a flood of traffic to render it unusable.
What is a Distributed Denial of Service (DDoS)
The process of transforming readable data into a unreadable forma is know as this?
What is is encryption
This type of malware is specifically designed to spy on users and collect their information
What is spyware
This HTTP header helps protect against cross-site request forgery attacks by validating requests.
What is the CSRF token
This framework is commonly used to assess the security posture of an organization
What is NIST Cybersecurity Framework
This security model requires users to prove their identity using tow or more methods
What is a multi-factor Authentications (MFA)
This type of cryptographic attack attempts to recover the encryption key by trying every possible combination
What is brute force attack
This type of attack involves inserting malicious code into a computer's memory to exploit software vulnerabilities.
What is a buffer overflow
This web security technique involves restricting the origins from which a web page can load resources
What is Content Security policy (CSP)
This term describes a system that is no longer supported by the vendor and is vulnerable to exploits
What is end-of-life (EOL) Software
This network protocol is often used to by attackers to map out and scan networks.
What is Nmap (Network Mapper)
This cryptographic technique involves using a pair of keys one public and one private
What is asymmetric encryption
This type of malware spreads by copings itself from one computer to another without user intervention
What is worm
This web security technique involves restricting the origins from which a web page can load resources
What is a Man-in-the-Middle (MitM) attack
What is antivirus software