Phishing - A cyberattack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — for example, a request from their bank or a note from someone in their company — and to click a link or download an attachment., Malware - Short for malicious software, encompasses any software intentionally designed to cause damage to a computer, server, client, or computer network., Ransomware - Malware where the data on a victim’s computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim., DDoS (Distributed Denial of Service) - An attempt to crash a website or online service by overwhelming it with a flood of internet traffic., Exploit - A piece of software, a set of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware, Brute Force Attack - Trying every possible combination of letters, numbers, and special characters until the correct password is found., Trojan Horse - Malware which misleads users of its true intent., Social Engineering - The art of manipulating people so they give up confidential information., Black Hat Hacker - Hacks into computer networks with malicious intent, stealing data, corrupting the system, or shutting it down entirely., White Hat Hacker - A cybersecurity expert who practices hacking to identify security vulnerabilities that a malicious hacker could potentially exploit., Encryption - The process of encoding information in such a way that only authorized parties can access it., Firewall - A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules, Keylogger - A type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard, Backdoor - A method of bypassing normal authentication, securing unauthorized remote access to a computer, while attempting to remain undetected., Patch - A set of changes to a computer program or its supporting data designed to update, fix, or improve it., Penetration Testing (Pen Testing) - A simulated cyber attack against your computer system to check for exploitable vulnerabilities, Spyware - A type of malware that is installed on a computer without the knowledge of the owner in order to collect the user’s personal information, SQL Injection - A code injection technique used to attack data-driven applications., Worm - A type of malware that spreads copies of itself from computer to computer, Digital Footprint - The traces of information that individuals leave online through activities like visiting websites, posting on social media, or subscribing to online services., Dumpster Diving - Searching through physical trash to find documents, storage media, or other items that contain sensitive information., Kali Linux - A Linux distribution designed for digital forensics and penetration testing, Piggybacking - The unauthorized access of someone else’s Wi-Fi network., Two-Factor Authentication (2FA) - A more secure way of authenticating because it adds a second layer of verification beyond just a password., Ghostware - Malware that avoids detection by hiding its presence after executing a malicious activity., Evil Twin - Setting up a fraudulent Wi-Fi access point that mimics the appearance of a legitimate one to deceive users into connecting., Credential Stuffing - Attackers use stolen account credentials to gain unauthorized access to user accounts through massive automated login requests., Root Access - Having the highest level of control over a computer or network., Zombie Computer - A computer used by a hacker to perform malicious tasks under remote direction., VPN (Virtual Private Network) - Extends a private network across a public network, allowing users to send and receive data across shared or public networks,
0%
Cybersecurity Words
Condividi
Condividi
Condividi
di
Gw07blackc
Secondary
Cybersecurity
Computing
Modifica contenuto
Stampa
Incorpora
Altro
Compiti
Classifica
Mostra di più
Mostra meno
Questa classifica è privata. Fai clic su
Condividi
per renderla pubblica.
Questa classifica è stata disattivata dal proprietario della risorsa.
Questa classifica è disattivata perché le impostazioni sono diverse da quelle del proprietario della risorsa.
Ripristina le opzioni
Abbinamenti
è un modello a risposta aperta. Non genera punteggi validi per una classifica.
Login necessario
Stile di visualizzazione
Tipi di caratteri
Abbonamento richiesto
Opzioni
Cambia modello
Mostra tutto
Mentre esegui l'attività appariranno altri formati.
Apri risultati
Copia link
Codice QR
Elimina
Ripristinare il titolo salvato automaticamente:
?