click below
click below
Normal Size Small Size show me how
Kirk
Term | Definition |
---|---|
Cybercrime | efforts by bad actors to profit from their malicious attacks. |
Disruption | attempts to disrupt the operations of organizations by attacking their IT and operational technology (OT) infrastructure to damage it, temporarily shut it down, or hold it for ransom. |
Espionage | cyberattacks backed by state agencies that are part of broader espionage and military activities. |
Phishing | target people to steal login and other confidential information by trying to trick them into clicking malicious links in emails, message apps, or on the web. |
Spear Phishing | Spear Phishing is a highly targeted variant of Phishing that uses a pretend email or message from an important individual to trick a person within the same or a partner organization. |
Malware | Malware is malicious software designed to infect IT systems and cause damage or compromise data security. |
Malware attacks | come in many forms, such as viruses, worms, trojans, adware, spyware, ransomware, and more. |
Ransomware | Ransomware is a form of malware that encrypts data on infected IT systems. |
Man In The Middle Attack | A man in the middle (MITM) attack occurs when cybercriminals intercept and alter network traffic flowing between IT systems. |
Denial Of Service Attack | A Denial of Service (DoS) attack aims to disrupt a service being provided on the network by flooding the targeted systems or applications with so many requests that the servers cannot respond to them all. |
Botnets | Botnets are widespread groups of devices that have been compromised and hijacked by cybercriminals in order to use them to target IT systems with DDoS attacks or other attack types. |
Adware | Adware is software that displays unwanted ads on end-user devices to generate revenue from advertisers. Adware is a type of malware. |
Crypto-Jacking | Crypto-jacking is a type of malware that uses the resources of the infected IT systems to 'mine' for cryptocurrencies. |
Insider Threats | Not all cyber threats originate from external sources. Data and other sensitive information like login credentials can leak from inside organizations. |