Phishing
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
Malware
Any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
Social Engineering
Social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information.
Insider Attack
An insider attack is defined as a security breach initiated by a user with authorized access to the system being targeted.
Sniffing
A sniffing attack is when a hacker uses a packet sniffer to capture and access confidential, unencrypted data packets for malicious purposes.
Spam
It is unsolicited and unwanted junk email sent out in bulk to a wholesale recipient list.
Spoofing
Spoofing is a type of cybercriminal activity where someone or something forges the sender's information and pretends to be a legitimate source, business, colleague, or other trusted contact for the purpose of gaining access to personal information, acquiring money, spreading malware, or stealing data.
Vishing
Vishing uses fraudulent phone numbers and social engineering to trick users into sharing sensitive info.
Adware
Adware (or advertising software) is the term used for various pop-up advertisements that show up on your computer or mobile device.
MFA
Multi-factor authentication (MFA) is a multi-step account login process that requires users to enter more information than just a password.
Spyware
Spyware is malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
Vulnerability
It is a weakness in an IT system that can be exploited by an attacker to deliver a successful attack.
Worm
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.
VPN
VPN stands for "Virtual Private Network" and describes the opportunity to establish a protected network connection when using public networks.
Smishing
It is a social engineering attack that uses fake mobile text messages to trick people into downloading malware, sharing sensitive information or sending money to cybercriminals.
Ransomware
It is a type of malware that holds a victim's sensitive data or device hostage, threatening to keep it locked—or worse—unless the victim pays a ransom to the attacker.
Antivirus
It is cybersecurity software that detects and removes malicious software (malware) from a computer, device, or network.
Threat
It is a statement that someone will be hurt or harmed, esp. if the person does not do something in particular.
Tailgating
A tailgating attack is a breach of security where an unauthorized actor gains access to a controlled area by closely following someone with legitimate access credentials.
Risk
Risk is the possibility of something bad happening