Adware
the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Phishing
network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node
Ring
network infrastructure within a small area.
LAN
a malicious program that replicates itself, automatically spreading through a network.
worm
a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
Keylogger
a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable.
Bus
network infrastructure for more than one geographic location.
WAN
usually disguised as benign or useful software that you download from the Internet, but they actually carry malicious code designed to do harm—thus their name
Trojan
consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
Brute force attack
a type of network topology that resembles a tree.
Tree
connects electronic devices within a user's immediate area
PAN
Holding data hostage in exchange for money
Ransomware
a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties.
Man in the middle attack
a type of network topology in which every device in the network is individually connected to a central node, known as the switch or hub
Star
a computer network that connects computers within a metropolitan area
MAN
malicious code that works directly within a computer's memory instead of the hard drive.
Fileless Malware
the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.
Eavesdropping
a type of network topology in which all devices in the network are interconnected.
Mesh
network of interconnected, dispersed LANs. Like MANs, campus networks extend coverage to buildings close in proximity.
Campus Area Network (CAN)