Phishing - A cyberattack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — for example, a request from their bank or a note from someone in their company — and to click a link or download an attachment., Malware - Short for malicious software, encompasses any software intentionally designed to cause damage to a computer, server, client, or computer network., Ransomware - Malware where the data on a victim’s computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim., DDoS (Distributed Denial of Service) - An attempt to crash a website or online service by overwhelming it with a flood of internet traffic., Exploit - A piece of software, a set of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware, Brute Force Attack - Trying every possible combination of letters, numbers, and special characters until the correct password is found., Trojan Horse - Malware which misleads users of its true intent., Social Engineering - The art of manipulating people so they give up confidential information., Black Hat Hacker - Hacks into computer networks with malicious intent, stealing data, corrupting the system, or shutting it down entirely., White Hat Hacker - A cybersecurity expert who practices hacking to identify security vulnerabilities that a malicious hacker could potentially exploit., Encryption - The process of encoding information in such a way that only authorized parties can access it., Firewall - A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules, Keylogger - A type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard, Backdoor - A method of bypassing normal authentication, securing unauthorized remote access to a computer, while attempting to remain undetected., Patch - A set of changes to a computer program or its supporting data designed to update, fix, or improve it., Penetration Testing (Pen Testing) - A simulated cyber attack against your computer system to check for exploitable vulnerabilities, Spyware - A type of malware that is installed on a computer without the knowledge of the owner in order to collect the user’s personal information, SQL Injection - A code injection technique used to attack data-driven applications., Worm - A type of malware that spreads copies of itself from computer to computer, Digital Footprint - The traces of information that individuals leave online through activities like visiting websites, posting on social media, or subscribing to online services., Dumpster Diving - Searching through physical trash to find documents, storage media, or other items that contain sensitive information., Kali Linux - A Linux distribution designed for digital forensics and penetration testing, Piggybacking - The unauthorized access of someone else’s Wi-Fi network., Two-Factor Authentication (2FA) - A more secure way of authenticating because it adds a second layer of verification beyond just a password., Ghostware - Malware that avoids detection by hiding its presence after executing a malicious activity., Evil Twin - Setting up a fraudulent Wi-Fi access point that mimics the appearance of a legitimate one to deceive users into connecting., Credential Stuffing - Attackers use stolen account credentials to gain unauthorized access to user accounts through massive automated login requests., Root Access - Having the highest level of control over a computer or network., Zombie Computer - A computer used by a hacker to perform malicious tasks under remote direction., VPN (Virtual Private Network) - Extends a private network across a public network, allowing users to send and receive data across shared or public networks,
0%
Cybersecurity Words
共用
共用
共用
由
Gw07blackc
Secondary
Cybersecurity
Computing
編輯內容
列印
嵌入
更多
作業
排行榜
顯示更多
顯示更少
此排行榜當前是私有的。單擊
共用
使其公開。
資源擁有者已禁用此排行榜。
此排行榜被禁用,因為您的選項與資源擁有者不同。
還原選項
匹配遊戲
是一個開放式範本。它不會為排行榜生成分數。
需要登錄
視覺風格
字體
需要訂閱
選項
切換範本
顯示所有
播放活動時將顯示更多格式。
打開結果
複製連結
QR 代碼
刪除
恢復自動保存:
?