This protocol creates an encrypted link between a browser and a web server.
What is TLS?
This identifies a device on a network using a unique hardware address.
What is a MAC Address?
This system detects suspicious activity but does not block it.
What is an IDS?
This memory stores data the CPU needs immediately and is erased when powered off.
What is RAM?
This attack injects malicious SQL commands into input fields.
What is SQLi?
This system manages digital certificates and encryption keys.
What is PKI?
This protocol pair forms the foundation of internet communication.
What is TCP/IP?
This system centralizes security logs for real‑time analysis and alerts.
What is a SIEM?
This startup firmware initializes hardware before the OS loads.
What is BIOS?
This attack injects malicious scripts into web pages.
What is XSS?
This email‑encryption tool is known for securing messages and files.
What is PGP?
This identifier is the name of a Wi‑Fi network.
What is an SSID?
This tool monitors endpoint devices and responds to threats.
What is EDR?
This modern firmware replaces BIOS and supports secure boot.
What is UEFI?
This organization publishes the Top 10 list of critical web application risks.
What is OWASP?
This asymmetric encryption algorithm is widely used for secure key exchange.
What is RSA?
This protocol is used for transferring web pages but is not encrypted.
What is HTTP?
This type of testing scans source code without executing it.
What is SAST?
This measures how smoothly graphics are displayed on screen.
What is FPS?
This security device sits between the internet and an application server to filter traffic.
What is a WAF?
This method encrypts an entire storage device, protecting data even if the device is stolen.
What is FDE?
This technology allows secure, encrypted communication over an untrusted network.
What is a VPN?
This type of testing evaluates applications while they are running.
What is DAST?
This value indicates how much heat a CPU or GPU is expected to produce under load.
What is TDP?
This vulnerability list provides standardized identifiers for publicly known security flaws
What is CVE?