Phishing - A cyberattack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — for example, a request from their bank or a note from someone in their company — and to click a link or download an attachment., Malware - Short for malicious software, encompasses any software intentionally designed to cause damage to a computer, server, client, or computer network., Ransomware - Malware where the data on a victim’s computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim., DDoS (Distributed Denial of Service) - An attempt to crash a website or online service by overwhelming it with a flood of internet traffic., Exploit - A piece of software, a set of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware, Brute Force Attack - Trying every possible combination of letters, numbers, and special characters until the correct password is found., Trojan Horse - Malware which misleads users of its true intent., Social Engineering - The art of manipulating people so they give up confidential information., Black Hat Hacker - Hacks into computer networks with malicious intent, stealing data, corrupting the system, or shutting it down entirely., White Hat Hacker - A cybersecurity expert who practices hacking to identify security vulnerabilities that a malicious hacker could potentially exploit., Encryption - The process of encoding information in such a way that only authorized parties can access it., Firewall - A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules, Keylogger - A type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard, Backdoor - A method of bypassing normal authentication, securing unauthorized remote access to a computer, while attempting to remain undetected., Patch - A set of changes to a computer program or its supporting data designed to update, fix, or improve it., Penetration Testing (Pen Testing) - A simulated cyber attack against your computer system to check for exploitable vulnerabilities, Spyware - A type of malware that is installed on a computer without the knowledge of the owner in order to collect the user’s personal information, SQL Injection - A code injection technique used to attack data-driven applications., Worm - A type of malware that spreads copies of itself from computer to computer, Digital Footprint - The traces of information that individuals leave online through activities like visiting websites, posting on social media, or subscribing to online services., Dumpster Diving - Searching through physical trash to find documents, storage media, or other items that contain sensitive information., Kali Linux - A Linux distribution designed for digital forensics and penetration testing, Piggybacking - The unauthorized access of someone else’s Wi-Fi network., Two-Factor Authentication (2FA) - A more secure way of authenticating because it adds a second layer of verification beyond just a password., Ghostware - Malware that avoids detection by hiding its presence after executing a malicious activity., Evil Twin - Setting up a fraudulent Wi-Fi access point that mimics the appearance of a legitimate one to deceive users into connecting., Credential Stuffing - Attackers use stolen account credentials to gain unauthorized access to user accounts through massive automated login requests., Root Access - Having the highest level of control over a computer or network., Zombie Computer - A computer used by a hacker to perform malicious tasks under remote direction., VPN (Virtual Private Network) - Extends a private network across a public network, allowing users to send and receive data across shared or public networks,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?