1.
An ethical hacker who uses skills to improve security.
2.
Simulated attackers and defenders for security testing.
3.
The process of gathering information about a target system.
4.
Protocols for securing communications over a network.
5.
Taking advantage of vulnerabilities to gain access.
6.
Actions taken after gaining access, like data extraction.
7.
Analyzing a system to understand its design and vulnerabilities.
8.
A framework for developing and executing exploit code.
9.
Manipulating people into divulging confidential information.
10.
A program where organizations reward individuals for finding vulnerabilities.
11.
The process of sharing cryptographic keys securely.
12.
Becoming desensitized to frequent security alerts.