A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information or inducing them to click a link or attachment that ends up delivering malware.
Phishing
It is a software designed to detect and destroy computer viruses.
Antivirus
Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
Worm
Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications.
Network
Information about persons should not be collected or processed illegally.
Principle of lawfulness and fairness
Any hacker who attempts to gain unauthorized access to a system with the intent to cause mischief, damage, or theft.
Black Hat Hacker
It is a series of numbers allocated to computers routers servers, and pretty much anything connected to the Internet, including websites. It functions very similarly to a standard address.
IP Address
This malware is a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door, allowing them to control your computer.
Trojan Horse
This strategy relies on user manipulation and human psychology.
Social engineering
All data collected should be complete and true to its origin and form.
Principle of accuracy
These attacks are generally performed by amatures who don‟t have any predefined motives to perform the cyber attack.
Unstructured attacks
Any technology, be it software or hardware, used to keep intruders out.
Firewall
It bombards users with endless ads and pop-up windows and causes a nuisance to the user experience.
Adware
The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
Authentication
All data collected shall be declared for its intended utilization.
Principle of purpose-specification
It is a cyber attack in which the network is choke and often collapsed by flooding it with useless traffic and thus preventing the legitimate network traffic.
Denial of Service attack (DoS)
Coding used to protect your information from hackers.
Encryption
A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock everything.
Ransomeware
It provides additional, revised or updated code for an operating system or application.
Patch
Appropriate measures should be taken to protect the files against both natural dangers, such as accidental loss or destruction, and human dangers, such as unauthorized access, fraudulent misuse of data or contamination by computer viruses.
Principle of security
It is an attack which proceeds with small increments and final add up to lead to a major attack.
Salami attack
It is a string of characters that allows access to a computer system or service.
Password
It is the use of online ads to distribute malicious programs.
Malvertising
It means that the data is only available to authorized parties.
Confidentiality
Everyone who offers proof of identity has the right to know whether information concerning him/ her is being processed and to obtain it in an intelligible form, without undue delay or expense, and to have appropriate rectifications or erasures made in the case of unlawful, unnecessary or inaccurate entries and, when it is being communicated, to be informed of the addressees.
Principle of interested-person access