What network security device monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies?
What authorized simulated cyberattack on a computer system, network, or web application is performed to evaluate its security?
Which cryptographic process transforms data into a fixed-size string of characters, typically irreversible, used for data integrity checks and password storage?
What is the umbrella term for any software intentionally designed to cause damage to a computer, server, client, or computer network?
What crime involves illegally obtaining and using another person's personal identifying information, usually for financial gain?
What cryptographic protocol is primarily used to secure communication over a computer network, commonly recognized by 'HTTPS' in website URLs?
What more targeted form of phishing specifically aims at individuals or organizations, often using personalized information to appear more legitimate?
Beyond digital defenses, what aspect of cybersecurity involves protecting hardware, facilities, and personnel from physical threats like theft or unauthorized access?
What documented set of procedures helps an organization detect, respond to, and recover from a cybersecurity breach or attack?
What is a security mechanism, often a decoy computer system, set up to attract, trap, and collect information about cyber attackers and their methods?