Unsolicited emails sent to many addresses. The purpose is often to make money through advertising or identity theft.
What is SPAM?
PII
Personally Identifiable Information
It is a word or phrase that verifies that you and only you have access to the account.
What is a Password?
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.
Who are hackers?
Computer programs that can block, detect, and remove viruses and other malware.
What is Anti-Virus?
Software that harms computers, networks, or people. Includes viruses, worms, and other computer programs.
What is Malware?
DDoS
Distributed Denial of Service
Extra copies of computer files that can be used to restore files that are lost or damaged.
What is a Backup?
Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.
What is Insider threat?
A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
What is a Patch?
Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
What is Phishing?
IoT
Internet of Things
A connection method, most often used by remote workers, to add security and privacy to private and public networks, like WiFi Hotspots and the Internet.
What is Virtual Private Network (VPN)?
The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
Who is Social Engineering?
A hardware device or specific software that sits at the front line of a network, acting as a communications liaison between internal and external devices. The only traffic allowed on the network is defined via policies – unauthorized traffic is blocked.
What is a Firewall?
A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a compensation if the victim wants his or her files back.
What is Ransomware?
NIST
National Institute of Standards and Technology
A legal notification directing you or the bureau/office to preserve any documentary material that may be relevant to a pending or foreseeable lawsuit or administrative adjudication.
What is a Litigation Hold?
Once the cyber-criminal gets into one computer, he/she can then attack the network and tunnel his/her way to confidential company data.
What is Data Exfiltration?
The process of using codes to make readable information unreadable. This information cannot be read without using a secret key.
What is Encryption?
A program that records every key struck on a keyboard and sends that information to an attacker.
What is a Keylogger?
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.
What is Standardization?
Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
What is a Hacktivist?
To maintain permissions to prevent an account from getting information they are not authorized to see while making the information available to those who are authorized.
What is Access Control?