Cyber - Technical words 3

Edit Answers
ESNUTLCYYPZXQQMAPTQF UPPJSGFJXJQTZQUQZZBT XYLNZIMUNGSYZLEZKEZA NPZOTANONBBLLTVSCRLE WVUIIFPPMIWDZOBNAOUR SBWTXIKDSJHEYDDQTDSH PEWCJLCDOZLRDMCLTAET EFUEFJYOZSEATJUWAYKR ARCJRPESSCPWPKLYMECE RNPNPKOJYRDMWHEHTXAD PMRIBFDVYIHOQAIYIPRI HLYLJSRUPPESCKPSMLNS ICLQXLNCFTVNUVYDHOJN SRISSSNHPKBACXRFTISI HQJXSLZWTIVRCTXHJTND ICCKWHKGEDFOSPAVRBSG NBDARLVRRDEEGESKMLYS GULCGRHWSIFQJGEKAYWV BRUTEFORCEATTACKDLUX JNSKVKWEXQJFLLNUVQVA
1.
A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
2.
A targeted phishing attack aimed at a specific individual or organization.
3.
Malware that encrypts a victim's files and demands payment to restore access.
4.
An attack that floods a system with traffic to make it unavailable.
5.
An attack that manipulates a database query through input fields.
6.
An attack that injects malicious scripts into content viewed by users.
7.
An attack where the attacker secretly intercepts communication between two parties.
8.
An attack that exploits a previously unknown vulnerability.
9.
Trying many combinations to guess a password or encryption key.
10.
A security risk originating from within the organization.
11.
An unskilled attacker who uses existing tools to launch attacks.
12.
A prolonged and targeted cyberattack.