click below
click below
Normal Size Small Size show me how
Cybersecurity Vocab
| Term | Definition |
|---|---|
| Cybercrime | efforts by bad actors to profit from their malicious attacks by hijacking computing resources |
| Disruption | attempts to disrupt the operations of organizations by attacking their IT and operational technology |
| Espionage | cyberattacks backed by state agencies that are part of broader espionage and military activities |
| Phishing | target people to steal login and other confidential information by trying to trick them |
| Spear Phishing | a highly targeted variant of Phishing that uses a pretend email or message from an important individual to trick a person |
| Malware | malicious software designed to infect IT systems |
| Ransomware | a form of malware that encrypts data on infected IT systems and cause damage or compromise data security |
| Man In The Middle Attack | cybercriminals intercept and alter network traffic flowing between IT systems |
| Denial Of Service Attack | aims to disrupt a service being provided on the network by flooding the targeted systems or applications with so many requests that the servers cannot respond to them all |
| Botnets | widespread groups of devices that have been compromised and hijacked by cybercriminals in order to use them to target IT systems with DDoS attacks or other attack types |
| Adware | software that displays unwanted ads on end-user devices to generate revenue from advertisers |
| Crypto-Jacking | a type of malware that uses the resources of the infected IT systems to 'mine' for cryptocurrencies |
| Insider Threats | data and other sensitive information like login credentials can leak from inside organizations |
| OWASP Top 10 | list of the most prevalent technical level attack methods that are in use |
| Cloud | technology that allows us to access our files and/or services through the internet from anywhere in the world |
| Software | set of programs that tell a computer to perform a task |
| Domain | group of computers, printers and devices that are interconnected and governed as a whole |
| Virtual Private Network | tool that allows the user to remain anonymous while using the internet |
| IP Address | internet version of a home address for your computer |
| Exploit | malicious application or script that can be used to take advantage of a computer’s vulnerability |
| Firewall | defensive technology designed to keep the bad guys out |
| Virus | malware aimed to corrupt, erase or modify information |
| Trojan horse | malware that often allows a hacker to gain remote access to a computer through a “back door” |
| Worm | malware that can replicate itself in order to spread the infection to other connected computers |
| Spyware | malware that functions by spying on user activity without their knowledge |
| Rootkit | malware that allows cybercriminals to remotely control your computer |
| Encryption | process of encoding data to prevent theft by ensuring the data can only be accessed with a key |
| Pen-testing | a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws |
| Clickjacking | hacking attack that tricks victims into clicking on an unintended link or button |
| Deepfake | audio or video clip that has been edited and manipulated to seem real or believable |
| Hacker Hats | differences in hacker “hats” refers to the intention of the hacker |
| White hat | legal hacker |
| Black hat | illegal hacker |