Cyber - Technical words 4

Edit Answers
KEAFIRVKEKOIJPZSTMVH NGHJJWPJYZVTOHRPMXNP ONRYUGJCUKTCFSVLTKOA IIAOANDVPGUCKSSEINIT TRWTCIWRCKCSNPNVKQTC AERHMNKZJZTZHNBFTDAH TTJKVNVAERQOSHAKOILM NLIVGALAFFBBZEWCOBAA EICOOCMQVANWFZONRNCN MFDXZSKPZIOAAQLORWSA GSBVDTCXDESVIWFIZWEG ESVAHRFVYGSLPNTTYEEE SEEINOMFAOMKSOECVZGM KRXTEPLVALDSPGNNRMEE RDWAOYQQVSQIOGGUAFLN ODRBAIHKYYXJOUSFWQIT WAPWDNBQZSTLFURHLLVD TCECUEYRIBOZIFTSMYID EALYVNZOHHOONKLAYJRL NMNNNOHKPZJPGVYHYLPI
1.
Malware designed to gain unauthorized root or administrative access.
2.
Exploiting a bug or vulnerability to gain elevated access rights.
3.
The process of applying updates to software to fix vulnerabilities.
4.
Dividing a network into segments to improve security.
5.
Checking for open ports to identify services running on a system.
6.
Sending IP packets with a false source IP address.
7.
Controlling network access using device MAC addresses.
8.
A network protocol for collecting IP traffic information.
9.
A standard for message logging in a network.
10.
A protocol for secure remote login and command execution.
11.
A function that converts data into a fixed-size string of characters.
12.
An entity that issues digital certificates.