A type of malware that infects files or systems by attaching itself to a legitimate program, spreading when the program is executed.
Virus
10
The specific needs and measures that must be taken to protect systems, data, and networks from unauthorized access or threats
Security Requirements
10
Password Protection
Methods and technologies used to secure passwords from unauthorized access, including encryption and strong password policies
15
A set of rules and guidelines that define how an organization manages, protects, and handles sensitive information and resources.
Security Policy
10
Desktop Computer Security
Measures taken to protect desktop computers from threats such as unauthorized access, malware, and data loss.
15
Ensuring that passwords are not easily guessable or traceable, often through techniques like using complex combinations or encryption
Password Obscurity
10
Firewall
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules to protect systems from unauthorized ac
15
The use of software or strategies to detect, prevent, and remove malware (malicious software) like viruses, worms, and trojans.
Malware Protection
10
Virus Protection
The use of tools and techniques to detect and eliminate viruses from a system, ensuring the integrity and security of data and applications.
15
The practices and measures taken to ensure that servers are protected from unauthorized access, cyber-attacks, and other security threats.
Server Security
10
User Account Permissions
The rights or privileges assigned to user accounts, determining what actions users can perform within a system or network, such as read, write, or execute.
15
Measures to ensure the security of data transmitted over the internet, including protecting Internet Protocol (IP) addresses and ensuring secure connections.
Internet Protocol Security
10
Shared Network Resources Protection
The process of securing network resources (such as files, printers, or databases) from unauthorized access or misuse on a shared network.
15
Ensuring that communication protocols (used to transfer data between systems) are secure and cannot be exploited by malicious users.
Protocol Security
10
Servers
Specialized computers or systems that provide services (such as web hosting, email, file sharing) to other computers or devices in a network.
15
A server designed to host applications, allowing clients to interact with those applications via network protocols like HTTP.