1
A system designed to prevent unauthorized access to or from a private network.
2
Software intentionally designed to cause damage to a computer, server, or network.
3
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
4
The process of converting information into a code to prevent unauthorized access.
5
Software designed to detect and destroy computer viruses and other malicious software.
6
An incident where unauthorized access is gained to data or systems.
7
A type of malicious software that blocks access to data until a ransom is paid.
8
A weakness in a system that can be exploited by threats to gain unauthorized access.
9
A secret word or phrase used to authenticate a user's identity.
10
Criminal activities conducted through digital means, such as hacking or identity theft.
11
The process of verifying the identity of a user or system