Cyber Terms
Cyber Terms
Cyber Terms
Cyber Terms
100

The practice of protecting systems, networks, and data from digital attacks by using a combination of technologies, processes, and controls 

What is Cyber Security

100

Cybercriminals use this technique to impersonate individuals or entities you recognize, like family, friends, or businesses. This tactic preys on your trust, making it harder to distinguish deception from reality and leaving you vulnerable to scams.

What is spoofing?

100

This happens when unsuspecting crypto currency investors buy in, the token’s price surges rapidly then scammers sell off their holdings.

what is Pump and Dump

100

A broad term that refers to the scams used by criminals to exploit a person’s trust in order to obtain money directly or obtain confidential information to enable a subsequent crime.

What is a social engineering scam

200

Synthetic media where images, videos, or audio are manipulated using AI to create realistic but fake representations of people or events

What is Deep fake

200

 A type of long-term con where scammers build trust with victims through fake online personas, often posing as romantic interests or financial advisors.

What is  Pig Butchering?

200

Is a fraudulent offer that tricks someone into giving money for a fake or non-existent investment opportunity that promises high returns with little to no risk.  

What is an Investment Scam?

200

A type of social engineering scam where cybercriminals trick users into executing malware by disguising it as a CAPTCHA verification.

A Fake CAPTCHA Attack

300

A cyberattack where attackers use stolen username and password combinations from data breaches to gain unauthorized access to user accounts on other platforms

What is Credential Stuffing ?

300

A type of social engineering attack which combines "SMS" (short message services, better known as texting) and "phishing."  

What is Smishing?

300

Is a security method that requires users to provide two or more forms of verification before gaining access to an account or system. It’s one of the most effective ways to protect against unauthorized access—even if your password is stolen.

What is MFA ?

300

A cyber threat where attackers use malicious QR codes to trick users into revealing sensitive information.

Quishing

400

Malware disguised as a legitimate generative AI application, which, once installed, can steal sensitive information

What is a Trojan?

400

Is a phone-based cyberattack where cybercriminals exploit the phone by posing as a trustworthy or authoritative source during a phone call.

What is Vishing?

400

A secure, encrypted digital tool that stores and manages your login credentials, allowing you to access all your accounts with one master password.

what is Password Vault?

400

Criminals hack into email systems to gain information about corporate payment systems, then deceive company employees into transferring money into their bank account.

Business Email Compromise

500

Is the development of computer systems that can perform tasks typically requiring human intelligence, such as speech recognition, decision-making, and visual perception.

What Artificial intelligence?

500

These are communication platforms, often online, where scammers promote fraudulent schemes, attempt to steal personal information, or trick victims into sending money.

What is called scam channels

500

Is a type of cyberattack where hackers use stolen usernames and passwords to try and access other accounts, banking on the fact that many people reuse the same login details across multiple sites.

What is Credential Stuffing?

500

Is a federal law that governs how personal information is handled by certain organizations and government agencies in Australia.

The Australian Privacy Act

M
e
n
u