Cyber - Technical words 5

Edit Answers
ACMJHXMBUVPYEQKTGZPH LTJHCPTNVIPDLQNOPVBK JUBNKDGMLUBFKWSZRGSW RAPNRKIEDCDDBARJRXTX ENTEENFKKLRMWOLRENLZ KHICDKEYEXCHANGELYSQ CTOJBKTBZVJWIQSXTTSR AHLGLVJCQDTJGMBNMNSE HRPQUNWSLTKOKGRVKULC TUSVEMQEVVIAYOUBFOVO ASAJTMDZASMESUFUEBBN HBTMEUWXGFZDCYERBGDN EGEFAZHJKWERSIUROUNA TRMMMPBIYOOIOITYQBDI IPOSTEXPLOITATIONXZS HEXPLOITATIONSGNMYGS WREVERSEENGINEERINGA SOCIALENGINEERINGLJN IJNDSNJBEZKQZHUAVJTC ALERTFATIGUERJKWNFBE
1.
An ethical hacker who uses skills to improve security.
2.
Simulated attackers and defenders for security testing.
3.
The process of gathering information about a target system.
4.
Protocols for securing communications over a network.
5.
Taking advantage of vulnerabilities to gain access.
6.
Actions taken after gaining access, like data extraction.
7.
Analyzing a system to understand its design and vulnerabilities.
8.
A framework for developing and executing exploit code.
9.
Manipulating people into divulging confidential information.
10.
A program where organizations reward individuals for finding vulnerabilities.
11.
The process of sharing cryptographic keys securely.
12.
Becoming desensitized to frequent security alerts.