Phishing - A cyberattack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — for example, a request from their bank or a note from someone in their company — and to click a link or download an attachment., Malware - Short for malicious software, encompasses any software intentionally designed to cause damage to a computer, server, client, or computer network., Ransomware - Malware where the data on a victim’s computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim., DDoS (Distributed Denial of Service) - An attempt to crash a website or online service by overwhelming it with a flood of internet traffic., Exploit - A piece of software, a set of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware, Brute Force Attack - Trying every possible combination of letters, numbers, and special characters until the correct password is found., Trojan Horse - Malware which misleads users of its true intent., Social Engineering - The art of manipulating people so they give up confidential information., Black Hat Hacker - Hacks into computer networks with malicious intent, stealing data, corrupting the system, or shutting it down entirely., White Hat Hacker - A cybersecurity expert who practices hacking to identify security vulnerabilities that a malicious hacker could potentially exploit., Encryption - The process of encoding information in such a way that only authorized parties can access it., Firewall - A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules, Keylogger - A type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard, Backdoor - A method of bypassing normal authentication, securing unauthorized remote access to a computer, while attempting to remain undetected., Patch - A set of changes to a computer program or its supporting data designed to update, fix, or improve it., Penetration Testing (Pen Testing) - A simulated cyber attack against your computer system to check for exploitable vulnerabilities, Spyware - A type of malware that is installed on a computer without the knowledge of the owner in order to collect the user’s personal information, SQL Injection - A code injection technique used to attack data-driven applications., Worm - A type of malware that spreads copies of itself from computer to computer, Digital Footprint - The traces of information that individuals leave online through activities like visiting websites, posting on social media, or subscribing to online services., Dumpster Diving - Searching through physical trash to find documents, storage media, or other items that contain sensitive information., Kali Linux - A Linux distribution designed for digital forensics and penetration testing, Piggybacking - The unauthorized access of someone else’s Wi-Fi network., Two-Factor Authentication (2FA) - A more secure way of authenticating because it adds a second layer of verification beyond just a password., Ghostware - Malware that avoids detection by hiding its presence after executing a malicious activity., Evil Twin - Setting up a fraudulent Wi-Fi access point that mimics the appearance of a legitimate one to deceive users into connecting., Credential Stuffing - Attackers use stolen account credentials to gain unauthorized access to user accounts through massive automated login requests., Root Access - Having the highest level of control over a computer or network., Zombie Computer - A computer used by a hacker to perform malicious tasks under remote direction., VPN (Virtual Private Network) - Extends a private network across a public network, allowing users to send and receive data across shared or public networks,
0%
Cybersecurity Words
Share
Share
Share
by
Gw07blackc
Secondary
Cybersecurity
Computing
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?