A
B
C
D
E
1

Phishing

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.

1

Malware

Any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.

1

Social Engineering

Social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information.

1

Insider Attack

An insider attack is defined as a security breach initiated by a user with authorized access to the system being targeted.

1

Sniffing

A sniffing attack is when a hacker uses a packet sniffer to capture and access confidential, unencrypted data packets for malicious purposes.

2

Spam

It is unsolicited and unwanted junk email sent out in bulk to a wholesale recipient list.

2

Spoofing

Spoofing is a type of cybercriminal activity where someone or something forges the sender's information and pretends to be a legitimate source, business, colleague, or other trusted contact for the purpose of gaining access to personal information, acquiring money, spreading malware, or stealing data.

2

Vishing

Vishing uses fraudulent phone numbers and social engineering to trick users into sharing sensitive info.

2

Adware

Adware (or advertising software) is the term used for various pop-up advertisements that show up on your computer or mobile device.

2

MFA

Multi-factor authentication (MFA) is a multi-step account login process that requires users to enter more information than just a password.

3

Spyware

Spyware is malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.

3

Vulnerability

It is a weakness in an IT system that can be exploited by an attacker to deliver a successful attack.

3

Worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

3

VPN

VPN stands for "Virtual Private Network" and describes the opportunity to establish a protected network connection when using public networks.

3

Smishing

It is a social engineering attack that uses fake mobile text messages to trick people into downloading malware, sharing sensitive information or sending money to cybercriminals.

4

Ransomware

It is a type of malware that holds a victim's sensitive data or device hostage, threatening to keep it locked—or worse—unless the victim pays a ransom to the attacker.

4

Antivirus

It is cybersecurity software that detects and removes malicious software (malware) from a computer, device, or network.

4

Threat

It is a statement that someone will be hurt or harmed, esp. if the person does not do something in particular.

4

Tailgating

A tailgating attack is a breach of security where an unauthorized actor gains access to a controlled area by closely following someone with legitimate access credentials.

4

Risk

Risk is the possibility of something bad happening

M
e
n
u