Ensures that resources are only granted to authorized users. Includes mechanisms like Access Control Lists (ACLs) and various authentication methods.
A symmetric encryption algorithm widely used for securing sensitive information.
A sophisticated, long-term cyber attack targeting specific entities.
Programs designed to detect, prevent, and remove malicious software.
A network of compromised computers controlled by an attacker, often used for malicious activities.
A type of software vulnerability where a program writes data beyond the allocated buffer's boundaries.
The practice of secure communication techniques that protect information from unauthorized access.
An attack that floods a target with traffic from multiple sources to overwhelm and disrupt services.
The process of encoding information to protect its confidentiality.
A network security system that monitors and controls incoming and outgoing network traffic.
A system that monitors network traffic for suspicious activity and policy violations.
Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
A social engineering attack that tricks users into revealing sensitive information.
Malware that encrypts a victim's files, demanding payment for the decryption key.
Psychological manipulation techniques used to trick people into divulging confidential information.
An extra layer of security that requires two different authentication factors.
A service that creates a secure, encrypted connection over a less secure network.
An attack that targets a previously unknown vulnerability, often before a patch is available.