This term describes the practice of protecting systems, networks, and programs from digital attacks.
cybersecurity
This type of malware is designed to replicate itself and spread to other devices.
Virus
This device connects multiple devices in a network and directs data traffic
router
This type of attack involves sending fraudulent emails to trick users into revealing sensitive information.
phishing
This major retail chain suffered a massive data breach in 2013, compromising millions of customers' credit card information.
Target
This is a set of rules for exchanging data between devices.
protocol
A type of malware that encrypts the victim's data and demands payment for the decryption key.
ransomware
A network segment isolated to protect a network from external threats
DMZ (Demilitarized Zone)
An attack where a threat actor impersonates another device or user.
spoofing
In 2014, this entertainment company's internal data was breached and leaked, leading to significant controversy.
Sony Pictures
A software that monitors and analyzes network traffic for potential threats
Intrusion Detection System (IDS)
This malware disguises itself as legitimate software
Trojan horse
The act of disguising data to protect its confidentiality.
encryption
The act of obtaining unauthorized access to a computer system.
hacking
In 2017, this global ransomware attack affected thousands of organizations worldwide, including the UK's National Health Service.
WannaCry
This type of software is used to manage the login and access rights of users within a network.
Access Control System
A program that records every keystroke made by a user
keylogger
A type of attack where the perpetrator sends a flood of data packets to overwhelm a network.
DDoS attack (Distributed Denial of Service)
An attack that exploits a software vulnerability to take control of a computer system
exploit
In 2018, this social media giant experienced a breach that exposed the personal data of millions of users
This is a sequence of characters used to verify the identity of a user
Malware that provides unauthorized access to a user's system
Backdoor
A security measure that filters incoming and outgoing network traffic
Firewall
A type of attack where the attacker secretly intercepts communication between two parties.
man in the middle
This infamous hacking group was responsible for a series of high-profile attacks, including the 2014 Sony Pictures hack.
Lazarus Group