A method of encrypting alphabetic text using symbols in a grid.
Pig Pen Cipher
These criteria, such as length, character types, and restrictions, are often enforced to enhance password strength.
Password Complexity Requirements
This method tries every possible combination of characters to crack passwords or encryption keys.
Brute Force Attack
This type of malware encrypts a victim's files and demands payment for their decryption.
Ransomware
This term refers to a weakness in a system or software that could be exploited by attackers.
Vulnerability
A method of encoding text characters as sequences of dots and dashes.
Morse Code
These cryptographic functions convert input data into a fixed-size string of characters, used extensively to store passwords securely.
Hashing Algorithms
This method uses a list of common words or phrases to attempt to crack passwords.
Dictionary Attack
Malware that disguises itself as legitimate software to trick users into installing it, allowing attackers to gain unauthorized access or steal information.
Trojan Horse
This network security system monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall
A cipher where each letter of the plaintext is shifted according to a person's birthdate.
Birthday Cipher
A random value added to passwords before hashing to ensure that even identical passwords have unique hash values.
Password Salt
These precomputed tables contain hashed passwords to facilitate rapid password cracking.
Rainbow Tables
Malware that secretly monitors and gathers information about a user's activities without their knowledge, often for advertising or espionage purposes.
Spyware
This process converts plaintext into ciphertext to secure sensitive data during storage or transmission.
Encryption
A cipher technique where each letter in the plaintext is shifted a certain number of places down or up the alphabet.
Caesar Shift Cipher
This software securely stores and manages passwords, often with features like encryption and automatic form filling.
Password Manager
This tactic manipulates individuals into divulging confidential information or performing actions they shouldn't.
Social Engineering
This attack takes advantage of a vulnerability that is unknown to the software developer and for which no patch is available.
Zero-Day Exploit
This process involves regularly updating software and systems with patches to fix security vulnerabilities and improve functionality.
Patch Management
A symmetric encryption algorithm used to secure sensitive data.
AES (Advanced Encryption Standard)
This security method requires users to provide two or more verification factors to gain access to a system.
Multi-Factor Authentication (MFA)
This fraudulent technique attempts to trick individuals into revealing sensitive information by posing as a trustworthy entity.
Phishing
Malware that records keystrokes on a computer, allowing attackers to capture sensitive information such as passwords and credit card numbers.
Keylogger
This process involves detecting, responding to, and mitigating security incidents such as breaches or cyber attacks.
Incident Response