This network security device monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What is a firewall?
This is the term used when attackers use social media profiles to gather personal information about individuals, which they later use to exploit weaknesses.
What is social profiling?
This technique is used to prevent malware from spreading by disconnecting affected systems from the network during a security beach.
What is isolation?
This protocol is widely used for securely transmitting data over the internet, ensuring encryption and authentication.
What is HTTP?
This type of attack involves tricking users into clicking on malicious links or downloading attachments that appear to be legitimate,
What is phishing?
This term refers to the process of monitoring systems for any sings of unauthorized access or potential security breaches.
What is intrusion detection?
This type of attack involves intercepting and altering communication between two parties without them knowing.
What is a man-in-the-middle attack?
This term to a measure taken to prevent unauthorized and data, often implemented in security protocols and system.
What is authentication
This type of malware is designed to give unauthorised control over a computer, often for malicious purposes, such as spying.
What is a rootkit?
This type of malware disguises itself as legitimate software and often tricks users into downloading it
What Trojan horse?
This security principle is based on granting the least amount of access necessary for users to perform their job function.
What is the principle of least privilege?
This term refers to the act of ensuring that sensitive data is only accessible by authorized individuals, preventing unauthorized access or disclosure.
What is risk mitigation?
This type of attack overwhelms a system or network with excessive traffic, rendering it unavailable to users.
What is a denial-of-service (DoS) attack?
This type of malware is self-replicating and spreads across a network without needing human interaction.
What is a woem?
This method is used to control network traffic and prevent unauthorized access by segmenting different areas of a network.
What is network segmentation?