Extra copies of computer files that can be used to restore files that are lost or damaged.
Backups
Computer programs that can block, detect, and remove viruses and other malware.
Antivirus
A collection of computers compromised by malicious code and controlled across a network.
BOTNET
Faking the sending address of a transmission to gain illegal entry into a secure system.
SPOOFING
The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization.
DATA BREACH
A mechanism for creating a secure connection between a computing device and a computer network.
The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
CYBERSECURITY
Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
SPYWARE
Unsolicited emails sent to many addresses.
SPAM
A flaw or weakness in an information system that could be exploited.
VULNERABILITY
Converting data into a form that cannot be easily understood by unauthorized people.
ENCRYPTION
A string of characters used to authenticate an identity.
PASSWORD
A cybersecurity risk that originates from within an organization.
INSIDER THREAT
A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
VIRUS
A type of malware that denies a user's access to a system or data until a sum of money is paid.
RANSOMWARE
A process or measure used to verify a user's identity.
AUTHENTICATION
Software designed to block malware from entering protected networks.
FIREWALL
Software that compromises the operation of a system by performing an unauthorized function or process.
MALWARE
An unauthorized user who attempts to or gains access to an information system.
HACKER
A cyber event involving loss of data or a breach of security controls by an unauthorized actor.
INCIDENT
A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
PASSKEY
The ability of individuals to understand and exercise control over how information about themselves may be used by others.
PRIVACY
A form of spying conducted for commercial purposes instead of purely national security.
CORPORATE ESPIONAGE
Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
PHISHING
Sensitive information that is found to be stored at a location that does not safeguard it from unauthorized access.
DATA SPILLAGE