The process of converting data into a secure format to prevent unauthorized access.
A security solution that monitors endpoints for suspicious activity and responds to threats.
The creation of software or scripts designed to take advantage of security vulnerabilities.
The practice of legally testing systems for security vulnerabilities to improve cybersecurity defenses.
A technique used to forge the sender address of an email to deceive recipients.
An attack where attackers intercept and listen to private communications.
A set of tools used by cybercriminals to exploit vulnerabilities in systems and deliver malware.
The protection of embedded systems, such as IoT devices, from cyber threats.
A cryptographic technique that provides strong security with smaller key sizes.
A set of security settings designed to strengthen system defenses.
Analyzing security events from multiple sources to detect patterns and potential threats.
Methods used by attackers to steal sensitive data from compromised systems.
The process of gathering information about a system, such as usernames and shares, during penetration testing.
A technique where multiple exploits are combined to escalate privileges or gain deeper access.
An attack where a user gains higher access permissions than they are authorized to have.
Malware that uses encryption to evade detection by security tools.
A type of SQL injection attack that relies on database error messages to extract information.
The interception of electromagnetic signals to gather sensitive information.
A security solution that provides antivirus, firewall, and intrusion prevention for endpoints.
A broad set of security measures designed to protect an organization's IT infrastructure.