Card 1
Term
Penetration Testing
Definition
Simulating attacks to find vulnerabilities.
Card 2
Term
White Hat Hacker
Definition
Ethical hacker improving security.
Card 3
Term
Black Hat Hacker
Definition
Malicious hacker exploiting systems.
Card 4
Term
Phishing
Definition
Fraudulent attempt to obtain sensitive information.
Card 5
Term
Social Engineering
Definition
Manipulating people to gain access.
Card 6
Term
Firewall
Definition
Network security system.
Card 7
Term
Encryption
Definition
Converting data into code.
Card 8
Term
Zero-Day Exploit
Definition
Attack on unknown vulnerabilities.
Card 9
Term
Bug Bounty
Definition
Reward for finding security flaws.
Card 10
Term
Cybersecurity Framework
Definition
Guidelines for managing security risks.