An incident where sensitive, confidential, or protected data is accessed or disclosed without authorization.
The investigation and analysis of digital devices to uncover cybercrimes and security incidents.
An attack that disrupts the availability of a network, system, or service by overwhelming it with traffic.
A set of tools and processes designed to prevent unauthorized access, use, or transfer of sensitive data.
An attack where an unauthorized entity takes control of a domain name.
The process of tracking activities on the dark web to detect cyber threats and data leaks.
An advanced network filtering technique that inspects packet contents for security threats.
A method of analyzing malware behavior in a controlled environment.
A vulnerability that allows attackers to access restricted directories on a server.
An attack where malicious software is automatically downloaded onto a user's device without consent.
A cryptographic mechanism used to verify the authenticity and integrity of digital data.
A symmetric encryption algorithm used to secure data, now considered outdated.
An access control model where data owners define permissions for resources.
A cybersecurity strategy that employs multiple layers of security controls to protect systems.
The amount of time an attacker remains undetected in a network after gaining access.
An attack that alters DNS records to redirect users to malicious websites.
The unauthorized transfer of sensitive data from a system or network.
A cybersecurity technique where fake networks are deployed to attract and study attackers.
Identifying a device based on unique hardware and software attributes.
The unauthorized modification of data to manipulate or compromise its integrity.