click below
click below
Normal Size Small Size show me how
Kirk
Term | Definition |
---|---|
Cybercrime | efforts by bad actors to profit from their malicious attacks. |
Disruption | attempts to disrupt the operations of organizations by attacking their IT and operational technology (OT) infrastructure to damage it, temporarily shut it down, or hold it for ransom. |
Espionage | cyberattacks backed by state agencies that are part of broader espionage and military activities. |
Phishing | Phishing attacks target people to steal login and other confidential information by trying to trick them into clicking malicious links in emails, message apps, or on the web. |
Spear Phishing | Spear Phishing is a highly targeted variant of Phishing that uses a pretend email or message from an important individual to trick a person within the same or a partner organization. |
Malware | Malware is malicious software designed to infect IT systems and cause damage or compromise data security. |
Malware attacks | come in many forms, such as viruses, worms, trojans, adware, spyware, ransomware, and more. |
Ransomware | Ransomware is a form of malware that encrypts data on infected IT systems. |
Man In The Middle Attack | A man in the middle (MITM) attack occurs when cybercriminals intercept and alter network traffic flowing between IT systems. |
Denial Of Service Attack | A Denial of Service (DoS) attack aims to disrupt a service being provided on the network by flooding the targeted systems or applications with so many requests that the servers cannot respond to them all. |
Botnets | Botnets are widespread groups of devices that have been compromised and hijacked by cybercriminals in order to use them to target IT systems with DDoS attacks or other attack types. |
Adware | Adware is software that displays unwanted ads on end-user devices to generate revenue from advertisers. |
Crypto-Jacking | Crypto-jacking is a type of malware that uses the resources of the infected IT systems to 'mine' for cryptocurrencies. |
Insider Threats | Not all cyber threats originate from external sources. |
OWASP Top 10 | Other types of cyberattacks exist. For example, SQL Injection and other injection attacks, cross-site scripting, and more. |
Cloud | A technology that allows us to access our files and/or services through the internet from anywhere in the world. |
Software | A set of programs that tell a computer to perform a task. |
Domain | A group of computers, printers and devices that are interconnected and governed as a whole. |
Virtual Private Network (VPN) | A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic. |
IP Address | An internet version of a home address for your computer, which is identified when it communicates over a network; For example, connecting to the internet (a network of networks). |
Exploit | A malicious application or script that can be used to take advantage of a computer’s vulnerability. |
Firewall | A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based. |
Virus | A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. |
Trojan horse | A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”. |
Worm | A piece of malware that can replicate itself in order to spread the infection to other connected computers. |
Spyware | A type of malware that functions by spying on user activity without their knowledge. |
Rootkit | Another kind of malware that allows cybercriminals to remotely control your computer. |
Encryption | The process of encoding data to prevent theft by ensuring the data can only be accessed with a key. |
Pen-testing | Short for “penetration testing,” this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws. |
Clickjacking | A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element. |
Deepfake | An audio or video clip that has been edited and manipulated to seem real or believable. |
White Hat / Black Hat | When speaking in cyber security terms, the differences in hacker “hats” refers to the intention of the hacker. |