This document defines and matches 20 cybersecurity terms with their definitions, including vulnerability, exploit, authentication, authorization, demilitarized zone, router, social engineering, firewall, and cloud computing. Key terms involve weaknesses that can be exploited, verifying identity and restricting user access, separating networks with firewalls, routing data across the internet, deceiving users for access, perimeter security, and remotely accessing resources via the cloud.
This document defines and matches 20 cybersecurity terms with their definitions, including vulnerability, exploit, authentication, authorization, demilitarized zone, router, social engineering, firewall, and cloud computing. Key terms involve weaknesses that can be exploited, verifying identity and restricting user access, separating networks with firewalls, routing data across the internet, deceiving users for access, perimeter security, and remotely accessing resources via the cloud.
This document defines and matches 20 cybersecurity terms with their definitions, including vulnerability, exploit, authentication, authorization, demilitarized zone, router, social engineering, firewall, and cloud computing. Key terms involve weaknesses that can be exploited, verifying identity and restricting user access, separating networks with firewalls, routing data across the internet, deceiving users for access, perimeter security, and remotely accessing resources via the cloud.
1.Vulnerability d. A flaw or weakness in a program
2.Exploit s. Software code that can be used to take advantage of a flaw and compromise a system 3.Authentication b. Verification of claimed identity 4.Authorization m. Restricting the actions that a user is permitted to perform 5.Demilitarized zone f. A subnetwork that is accessible from the Internet but (DMZ) separate from the organization's internal network 7.Router o. A device that uses the Internet Protocol (IP) to send packets across networks 8.Social engineering j. An attack that involves deception to obtain access 9.Firewall k. A device that provides perimeter security by filtering packets 14.Change control and q. A plan to ensure that modifications to an information change management system do not reduce its security 20.Cloud computing i. An arrangement whereby a user remotely accesses software, hardware, or other resources via a browser 8.1. Match the following terms with their definitions: