1
The process of verifying the identity of a user or device to ensure that only authorized individuals or systems can access resources.
2
Malicious software designed to harm or exploit computer systems, including viruses, worms, trojans, ransomware, and spyware.
3
A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity.
4
A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
5
The process of converting data into a format that cannot be easily understood by unauthorized users.
6
A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity.
7
A weakness or flaw in a system, network, or application that can be exploited by attackers to gain unauthorized access or cause harm.
8
An intentional malicious act that targets computer systems, networks, or devices to disrupt, damage, or gain unauthorized access to information.