Access Control
Ensures that resources are only granted to authorized users. Includes mechanisms like Access Control Lists (ACLs) and various authentication methods.
Ensures that resources are only granted to authorized users. Includes mechanisms like Access Control Lists (ACLs) and various authentication methods.
A symmetric encryption algorithm widely used for securing sensitive information.
A sophisticated, long-term cyber attack targeting specific entities.
Programs designed to detect, prevent, and remove malicious software.
A network of compromised computers controlled by an attacker, often used for malicious activities.
A type of software vulnerability where a program writes data beyond the allocated buffer's boundaries.
The practice of secure communication techniques that protect information from unauthorized access.
An attack that floods a target with traffic from multiple sources to overwhelm and disrupt services.
The process of encoding information to protect its confidentiality.
A network security system that monitors and controls incoming and outgoing network traffic.
A system that monitors network traffic for suspicious activity and policy violations.
Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
A social engineering attack that tricks users into revealing sensitive information.
Malware that encrypts a victim's files, demanding payment for the decryption key.
Psychological manipulation techniques used to trick people into divulging confidential information.
An extra layer of security that requires two different authentication factors.
A service that creates a secure, encrypted connection over a less secure network.
An attack that targets a previously unknown vulnerability, often before a patch is available.