Email
Phishing
IT Acronyms
Coding
Cybersecurity
100

This feature allows you to send a copy of an email to additional recipients without the main recipients knowing.

BBC

100

A technique used by phishers to disguise the true sender of an email.

Spoofing

100

This acronym is often used to describe a high-speed internet connection.

DSL

100

This is a sequence of instructions that a computer executes.

Algorithm

100

This is a malicious software designed to harm computer systems.

Malware

200

This email protocol is used to send and receive emails.

SMTP

200

A security measure that can help protect against phishing attacks.

Two-Factor Authentication

200

This acronym is a protocol used to transfer files over a computer network.

FTP

200

This is the process of finding and fixing errors in a program.

Debugging

200

This is a security measure that helps protect computer systems from unauthorized access.

Firewall

300

This email client is a popular open-source option.

Thunderbird

300

A common tactic used in phishing emails to create a sense of urgency.

Scarcity Tactics

300

This acronym stands for a type of memory that loses its contents when the power is turned off.

RAM

300

This is a type of data structure that stores elements in a key-value pair format.

Hash Map

300

This is a type of malware that encrypts files and demands a ransom to decrypt them.

Ransomware

400

This email protocol is used to retrieve emails from a mail server.

IMAP

400

A type of phishing attack that targets employees of a specific organization.

Spear Phishing

400

This acronym refers to a type of software that allows users to access and use remote computers.

RDP

400

This code language is primarily used for iOS app development, known for its performance and ease of use.

Swift

400

This is a security practice that involves regularly updating software and systems.

Patch Management

500

This protocol is used to secure email communication by encrypting messages.

TLS

500

A type of phishing attack that targets mobile devices.

Smishing

500

This acronym stands for a type of network that uses a decentralized approach to manage and distribute resources.

P2P
500

This is a type of software that helps developers write and debug code.

IDE

500

This is a type of cyberattack that involves flooding a server with traffic to overload it.

Denial of Service (DoS) Attack

M
e
n
u