Spyware - malicious software designed to monitor and collect data from a computer system without the user's knowledge or consent., Zero-Day Exploit - a malicious attack that exploits software or hardware vunerabilities that the vendor has not yet patched., Man in the Middle (MITM) - an attack in which an attacker intercepts communication between two parties., Password Cracking - an attack in which an attacker attempts to access a user's account by guessing the user's password., Spoofing - an attack in which an attacker attempts to gain access to a computer system by pretending to be a legitimate user., Brute Force - an attack in which an attacker attempts to guess a user's password by trying every possible combination of characters. , Keylogger - a malware designed to capture keystrokes and other sensitive data., Crypto-Currency - digital currency that uses cryptography to secure transations, control the creation of additional units, and verify the transfer of assets., Firewall - a network security system that monitors and controls incoming and outgoing network traffic and protectsagainst unauthorised access. , Antivirus - a program that scans a computer system for viruses, malware, and other malicious programs., System Hardening - secures a system by reducing its attack surface and minimizing the potential for unauthorised access., Incident Response - responding to a security incident in an organisedand systematic manner.,

Cybersecurity Common Terms 2

Leaderboard

Visual style

Options

Switch template

Continue editing: ?