1
A network security system that monitors and controls incoming and outgoing traffic.
2
Software designed to disrupt, damage, or gain unauthorized access to computer systems.
3
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
4
The process of converting information into a code to prevent unauthorized access.
5
Software designed to detect and destroy computer viruses and other malicious software.
6
The act of exploiting vulnerabilities in a computer system or network to gain unauthorized access.
7
A type of malicious software that encrypts files and demands payment for their release.
8
An incident where unauthorized access to data or systems occurs, compromising security.
9
AI-generated media used to impersonate individuals for cyber deception.
10
A cyberattack that floods a system with traffic to disrupt its services.
11
A network of compromised computers controlled by a hacker to perform cyberattacks.
12
A malicious tool that records keystrokes to steal sensitive information.
13
A decoy system designed to lure cybercriminals and study their behavior.
14
A hidden part of the internet where illegal activities often occur.
15
The practice of hiding data within other digital files to avoid detection