Types of Cyber Security
Attacks
Data breaches
Terms
Jobs
100

Uses devices and processes to secure networks 

Network Security 

100

Emails, Photos, or texts that seem to be from a legitimate company with the intent of installing malicious malware

Phishing 

100

Stole data from over 1 billion users in 2017

Yahoo

100

Harmful to software and designed to damage your system

Malware

100

Keeps stability on internal and external applications of organizations 

Security Engineer 

200

Securing the data on the cloud

Cloud Security 

200

Takes advantage of vulnerabilities that are unknown or unidentified 

Exploits 

200

330 Million records were exposed through a glitch

Twitter 

200

The verifying process to make sure you are who you say you are 

Authentication 

200

Goes through and monitors data  

Information Security Analyst

300

Managing the access and privileges for each user

Management 

300

Using extortion techniques to block your access until you give what they ask

Ransomware 

300

Experienced one of the worst breaches 

Adobe 

300

Designed to detect, prevent, and remove malicious infections 

Antivirus 

300

Designs security structures 

Security Architect

400

Keeps information private and accessible to the user 

Information Security 

400

When a hacker cracks your password 

Password attack 

400

In 2016 it was made known that old information could be sold

Myspace

400

Controls all the incoming and outgoing network usage, and makes sure it isn't available to others

Firewall

400

Evaluates Cyber security techniques and plans IT architecture  

Cyber Security consultant 

500

Protects computer systems, applications, data, and digital assets that national security depends on

Terminal Security 

500

Network of computers infected with malware that are all being controlled by the Botnet instructor 

Botnet

500

Became public that personal details could be shared

Aadhaar

500

Codes used to protect information from hackers

Encryption 

500

In charge of the day to day operations and cyber security systems 

Security Administrator 

M
e
n
u