Terminology
Malware
Types of Phish
Work at Home
Social Engineering
100

This refers to the practice of ensuring the integrity, confidentiality and availability of information.

Cyber Security

100

This type of malware is aimed to corrupt, erase or modify information on a computer before spreading to others.

Virus

100

This type of malware is a software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.

Email Phishing

100

This is already on your SCL Computer, but you should make sure your personal computer has it to prevent malware from compromising your system.

Antivirus (AV) software

100

This social engineering attack is the most common type of attack using email.

Phishing

200

A way to secure private information by encoding it so only approved parties can decrypt and access it.

Data Encryption

200

This type of malware deliberately prevents you from accessing files on your computer and holding your data hostage.

Ransomware

200

Criminals who do this will already have a person’s name, place of employment, job title, email address and specific information about their job role.

Spear Phishing

200

This needs to be updated regularly to prevent criminals from exploiting weaknesses.

Programs and operating systems

200

In these social engineering attacks, someone without proper authentication follows an authenticated associate into a restricted area.

Tailgating (piggybacking)

300

This allows you to create a secure connection to another network by using the internet.

Cloud (cloud computing)

300

This type of malware often allows a hacker to gain remote access to a computer through a “back door”.

Trojan Horse

300

With this phish, telephones replace emails as the method of communication.

Vishing (voice phishing)

300

This technology allows computers and other devices to communicate over a wireless signal.

WiFi Network

300

This social engineering attack uses a false promise to pique a victim’s greed or curiosity. They lure them into a trap that steals their personal information or inflicts their system with malware

Baiting

400

This is the delivery of different services through the Internet.

Virtual Private Network (VPN)

400

This type of malware can replicate itself in order to spread the infection to other connected computers.

Worm

400

This phish attempts to imitate senior executives.

Whaling

400

You should use this when you are connecting to public WiFi networks.  SCL requires it when accessing data remotely.

Virtual Private Network (VPN)

400

This social engineering attack focuses on creating a fabricated scenario to convince a victim to give up valuable information.

Pretexting

500

The act of taking advantage of human trust to gain access to private information.

Social Engineering

500

This type of malware is a software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.

Bot/Botnet

500

This new attack uses social media to trick people. Criminals use fake URLs, posts, tweets and IM to persuade people to divulge sensitive information or download malware.

Angler Phishing

500

If you get emails with any suspicious links or attachments, you should forward them to this SCL Email.

phishing@sclhealth.org

500

This attack baits a target with the promise of a service or benefit in exchange for information or access.  For example, request their victim to disable their AV software temporarily to install a malicious application.

Quid Pro Quo

M
e
n
u