1.
Malware designed to gain unauthorized root or administrative access.
2.
Exploiting a bug or vulnerability to gain elevated access rights.
3.
The process of applying updates to software to fix vulnerabilities.
4.
Dividing a network into segments to improve security.
5.
Checking for open ports to identify services running on a system.
6.
Sending IP packets with a false source IP address.
7.
Controlling network access using device MAC addresses.
8.
A network protocol for collecting IP traffic information.
9.
A standard for message logging in a network.
10.
A protocol for secure remote login and command execution.
11.
A function that converts data into a fixed-size string of characters.
12.
An entity that issues digital certificates.