port 22
SSH
IP
Internet Protocol
this person breaches systems for some sort of (Usually Monetary) payout.
Who is a Hacker
This piece of malware sneaks onto your computer when you think you are downloading another program. (Commonly an Adobe Flash update)
What is a Trojan
This device stops unwanted traffic from reaching your network.
Firewall
Wich 2 ports are related to FTP
20 & 20
TCP
Transport Control Protocol
Discontent with their job, this person uses permission that the already have to Exploit their company.
Who is an Insider threat
This Malware Encrypts all information it can find on a system until the organization pays an amount of money for the key
What is Ransom-ware
A computer that controls access to a centralized resource
Server
HTTP is found on this port
80
DNS
Domain Name System
This person knows nothing about computers, relying exclusively on tools, programs and malware constructed by someone else.
Who is a Script Kiddie
Something that doesn't Exist. and you should never use me in a conversation with another cyber-security professional
What is a virus
This device allows my network to "talk" to other networks
Router
port 443
HTTPS
ACL
Access Control List
these groups target organizations known for clubbing baby seals. their motivation is moral in nature, but no less illegal.
Who are Hacktivists
After a set amount of time, this malware will goes off with a bang
What is a Logic Bomb
This device allows other devices to connect to a network without a hard connection
What is a WAP
Port 3398
RDP? What is RDP?
TLS
Transport Layer Security
These Groups will lurk in systems for years, monitoring and gathering data, When they do strike it can be considered an act of war.
who are APTs
once deployed this Malware give access with all of the permissions
What is a Root Kit
This device allows devices on the same network to talk to each other.
Switch