A system that monitors network traffic for suspicious activity and alerts administrators about potential intrusions.
What is an Intrusion Detection System (IDS)?
Control to apply or maintain permissions to prevent an account from getting information they are not authorized to see while making the information available to those who are authorized.
What is Access Control?
A type of malware that encrypts a victim's data, demanding a payment to decrypt it.
What is ransomware?
This type of malicious software is designed to secretly collect sensitive information, such as keystrokes or login credentials
What is a Keylogger?
This regulation, enacted in the European Union, governs the protection of personal data and privacy.
What is GDPR (General Data Protection Regulation)?
A process to identify potential security weaknesses on a system or network
What is a vulnerability scan?
In addition to the GDPR, this U.S. state law mandates the protection of personal data and provides individuals with the right to request access to their personal information held by businesses.
What is the California Consumer Privacy Act (CCPA)?
A security model that requires strict verification of user identities and device security before granting network access
What is Zero Trust Network Access (ZTNA)?
A type of malware that can replicate itself and spread to other computers, often through network vulnerabilities.
What is a worm?
A cyber attack that exploits a previously unknown vulnerability in software or hardware
What is a "Zero-Day Attack"
This framework, often used by organizations to demonstrate their commitment to protecting sensitive information, includes a series of security controls and best practices aligned with privacy regulations.
What is ISO/IEC 27001?
A network segment that acts as a buffer between a trusted internal network and the public internet
What is a DMZ (Demilitarized Zone)
This term refers to a vulnerability in a web application that occurs when user input is improperly sanitized, allowing an attacker to inject harmful scripts into web pages viewed by other users.
What is Cross-Site Scripting (XSS)?
This principle means that users should only have access to the data and resources necessary for their job functions.
What is Least Privilege?
A network security system that monitors and controls incoming and outgoing network traffic, acting as a barrier between trusted and untrusted networks
What is a Firewall
This concept refers to the practice of ensuring that a system can continue to operate even after a security breach or failure occurs.
What is Business Continuity?
This type of attack is designed to flood a system with traffic to overwhelm and render it inoperable.
What is a Denial of Service (DoS) Attack?
PGP, often used in secure email communication, relies on public-key cryptography to ensure that messages are encrypted and digitally signed. What does PGP stand for?
What is Pretty Good Privacy?