click below
click below
Normal Size Small Size show me how
Kirk
| Term | Definition |
|---|---|
| Cybercrime | efforts by bad actors to profit from their malicious attacks. |
| Disruption | attempts to disrupt the operations of organizations by attacking their IT and operational technology (OT) infrastructure to damage it, temporarily shut it down, or hold it for ransom. |
| Espionage | cyberattacks backed by state agencies that are part of broader espionage and military activities. |
| Phishing | target people to steal login and other confidential information by trying to trick them into clicking malicious links in emails, message apps, or on the web. |
| Spear Phishing | Spear Phishing is a highly targeted variant of Phishing that uses a pretend email or message from an important individual to trick a person within the same or a partner organization. |
| Malware | Malware is malicious software designed to infect IT systems and cause damage or compromise data security. |
| Malware attacks | come in many forms, such as viruses, worms, trojans, adware, spyware, ransomware, and more. |
| Ransomware | Ransomware is a form of malware that encrypts data on infected IT systems. |
| Man In The Middle Attack | A man in the middle (MITM) attack occurs when cybercriminals intercept and alter network traffic flowing between IT systems. |
| Denial Of Service Attack | A Denial of Service (DoS) attack aims to disrupt a service being provided on the network by flooding the targeted systems or applications with so many requests that the servers cannot respond to them all. |
| Botnets | Botnets are widespread groups of devices that have been compromised and hijacked by cybercriminals in order to use them to target IT systems with DDoS attacks or other attack types. |
| Adware | Adware is software that displays unwanted ads on end-user devices to generate revenue from advertisers. Adware is a type of malware. |
| Crypto-Jacking | Crypto-jacking is a type of malware that uses the resources of the infected IT systems to 'mine' for cryptocurrencies. |
| Insider Threats | Not all cyber threats originate from external sources. Data and other sensitive information like login credentials can leak from inside organizations. |