click below
click below
Normal Size Small Size show me how
Cyber security
Term | Definition |
---|---|
Cybercrime | efforts by bad actors to profit from their malicious attacks. Either by direct financial theft, use of stolen credit card information, selling information obtained via a data breach on the dark web |
Disruption | attempts to disrupt the operations of organizations by attacking their IT and operational technology (OT) infrastructure |
Espionage | cyberattacks backed by state agencies that are part of broader espionage and military activities. |
Phishing | target's people to steal login and other confidential information by trying to trick them into clicking malicious links in emails, message apps, or on the web. |
Spear Phishing | a highly targeted variant of Phishing that uses a pretend email or message from an important individual to trick a person |
Malware | Malware is malicious software designed to infect IT systems and cause damage or compromise data security. |
Malware attacks | viruses, worms, trojans, adware, spyware, ransomware, and more. |
Ransomware | a form of malware that encrypts data on infected IT systems. It demands a ransom to get a code to decrypt the infected system, usually to an anonymous address using Bitcoin. |
Man In The Middle Attack | A man in the middle (MITM) attack occurs when cybercriminals intercept and alter network traffic flowing between IT systems. |
Denial Of Service Attack | aims to disrupt a service being provided on the network by flooding the targeted systems or applications with so many requests that the servers cannot respond to them all. |
Botnets | groups of devices that have been compromised and hijacked by cybercriminals in order to use them to target IT systems with DDoS attacks or other attack types. |
Adware | software that displays unwanted ads on end-user devices to generate revenue from advertisers. |
Crypto-Jacking | a type of malware that uses the resources of the infected IT systems to 'mine' for cryptocurrencies. |
Insider Threats | via malicious activity by staff, or more frequently due to a mistake. |
Cloud | A technology that allows us to access our files and/or services through the internet from anywhere in the world. |
Software | A set of programs that tell a computer to perform a task. |
Domain | A group of computers, printers and devices that are interconnected and governed as a whole. |
Virtual Private Network (VPN) | A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic. |
IP Address | An internet version of a home address for your computer, which is identified when it communicates over a network; |
Exploit | A malicious application or script that can be used to take advantage of a computer’s vulnerability. |
Firewall | A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based. |
Virus | - A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. |
Trojan horse | A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”. |
Worm | A piece of malware that can replicate itself in order to spread the infection to other connected computers. |
Spyware | A type of malware that functions by spying on user activity without their knowledge. |
Rootkit | Another kind of malware that allows cybercriminals to remotely control your computer. |
Encryption | The process of encoding data to prevent theft by ensuring the data can only be accessed with a key. |
Pen-testing | a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws. |
Clickjacking | - A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element. |
Deepfake | An audio or video clip that has been edited and manipulated to seem real or believable. |
White Hat / Black Hat | Breaches the network to gain sensitive information with the owner’s consent – making it completely legal. Hackers that break into the network to steal information that will be used to harm the owner or the users without consent |