Phishing - A cyberattack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — for example, a request from their bank or a note from someone in their company — and to click a link or download an attachment., Malware - Short for malicious software, encompasses any software intentionally designed to cause damage to a computer, server, client, or computer network., Ransomware - Malware where the data on a victim’s computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim., DDoS (Distributed Denial of Service) - An attempt to crash a website or online service by overwhelming it with a flood of internet traffic., Exploit - A piece of software, a set of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware, Brute Force Attack - Trying every possible combination of letters, numbers, and special characters until the correct password is found., Trojan Horse - Malware which misleads users of its true intent., Social Engineering - The art of manipulating people so they give up confidential information., Black Hat Hacker - Hacks into computer networks with malicious intent, stealing data, corrupting the system, or shutting it down entirely., White Hat Hacker - A cybersecurity expert who practices hacking to identify security vulnerabilities that a malicious hacker could potentially exploit., Encryption - The process of encoding information in such a way that only authorized parties can access it., Firewall - A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules, Keylogger - A type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard, Backdoor - A method of bypassing normal authentication, securing unauthorized remote access to a computer, while attempting to remain undetected., Patch - A set of changes to a computer program or its supporting data designed to update, fix, or improve it., Penetration Testing (Pen Testing) - A simulated cyber attack against your computer system to check for exploitable vulnerabilities, Spyware - A type of malware that is installed on a computer without the knowledge of the owner in order to collect the user’s personal information, SQL Injection - A code injection technique used to attack data-driven applications., Worm - A type of malware that spreads copies of itself from computer to computer, Digital Footprint - The traces of information that individuals leave online through activities like visiting websites, posting on social media, or subscribing to online services., Dumpster Diving - Searching through physical trash to find documents, storage media, or other items that contain sensitive information., Kali Linux - A Linux distribution designed for digital forensics and penetration testing, Piggybacking - The unauthorized access of someone else’s Wi-Fi network., Two-Factor Authentication (2FA) - A more secure way of authenticating because it adds a second layer of verification beyond just a password., Ghostware - Malware that avoids detection by hiding its presence after executing a malicious activity., Evil Twin - Setting up a fraudulent Wi-Fi access point that mimics the appearance of a legitimate one to deceive users into connecting., Credential Stuffing - Attackers use stolen account credentials to gain unauthorized access to user accounts through massive automated login requests., Root Access - Having the highest level of control over a computer or network., Zombie Computer - A computer used by a hacker to perform malicious tasks under remote direction., VPN (Virtual Private Network) - Extends a private network across a public network, allowing users to send and receive data across shared or public networks,
0%
Cybersecurity Words
共享
共享
共享
由
Gw07blackc
Secondary
Cybersecurity
Computing
编辑内容
打印
嵌入
更多
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
匹配游戏
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
切换模板
显示所有
播放活动时将显示更多格式。
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?