ATTACK TERMS
AUTHENTICATION
DATA TERMS
DATABASE TERMS
NETWORK DEVICES TERMS
100

interception of the contents of communication through a secret connection to the telephone line of one whose conversations are to be monitored usually for purposes of criminal investigation by law enforcement officers

Wiretapping

100

Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the information.

Non-repudiation

100

securing digital data using one or more mathematical techniques, along with a password or "key" used to decrypt the information.

Encryption

100

is a type of database that stores and provides access to data points that are related to one another.

Relational database

100

it transforms digital information from your computer into analog signals that can transmit over wires, and it can translate incoming analog signals back into digital data that your computer can understand.

Modem

200

the unauthorized interception of a conversation, communication or digital transmission in real time

Eavesdropping

200

the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity

Authentication

200

the process of modifying, encoding or converting the bits structure of data in such a way that it consumes less space on disk. It enables reducing the storage size of one or more data instances or elements.

Compression

200

Their simple structure means they take up less space than structured files.

Flat file

200

manage the flow of data across a network by transmitting a received network packet only to the one or more devices for which the packet is intended

Switch

300

an attack meant to shut down a machine or network, making it inaccessible to its intended users. 

Denial-of-Service  

300

maintaining the consistency, accuracy and trustworthiness of data over its entire lifecycle

Integrity

300

can be applied to one or more users in the workspace to control the data that is visible to them.

Permissions

300

rules enforced on the data columns of a table. These are used to limit the type of data that can go into a table. This ensures the accuracy and reliability of the data in the database.

Constraint

300

a security device in the form of computer hardware or software. It can help protect your network by acting as an intermediary between your internal network and outside traffic. It monitors attempts to gain access to your operating system and blocks unwanted incoming traffic and unrecognized sources.

Firewall

400

This type of attack occurs when a cybercriminal eavesdrops on a secure network communication, intercepts it, and then fraudulently delays or resends it to misdirect the receiver into doing what the hacker wants

Replay attack

400

disables a user account when a certain number of failed logons occur due to wrong passwords within a certain interval of time.

Password lockout

400

the assessment of data for quality throughout its lifecycle to ensure its accuracy and efficacy for specific usage. Data performance is measured and issues are identified for remediation

Auditing

400

a column or group of columns in a relational database table that provides a link between data in two tables.

Foreign key

400

is a networking hardware device that allows other Wi-Fi devices to connect to a wired network

Access point

500

the act of deceiving someone by pretending to be another person. 

Impersonating

500

setting determines how long a password can be used before the user is required to change it.

Password Expiration

500

can perform many different functions in a database. Their most common function is to retrieve specific data from the tables.

Data querying

500

refers to the organization of data as a blueprint of how the database is constructed (divided into database tables in the case of relational databases)

Schema

500

a set of changes to a computer program or its supporting data designed to update, fix, or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually being called bugfixes or bug fixes

Patching

M
e
n
u