Action of proving if you are who you say you are.
Authentication
A group of computers that share user information.
Domain
A program or file that is harmful to a computer and networks.
Malware
Malware that spreads between computers.
Virus
connection of servers and computers, software, databases.
Cloud
A group of computers that have been infected by malware and are in control of a malicious actor.
Botnet
Hiding something with phrases. Protecting data by using math models
Encryption
Impersonating someone through or other communication methods.
Phishing
Tool to use to get information from a certain area.
VPN
Unique characters that identify a computer over a network.
Ip Address
An attacker is positioning himself between communicating parties and stealing and altering data.
Man in the Middle Attack
piece of software or a sequence of commands.
Exploit
Prevents users from accessing or using their system.
Spoofing- Pretending be a known source when they are an unknown source
Ransomware
The programs and other software information used by a computer.
Software
Broad range of malicious activity through human interaction.
Social Engineering
System infiltrated, and data stolen
Data Breach
Security system that prevents traffic in a network.
Firewall
Malware that enters a computer and gathers info from the device and user.
Spyware
A type of trojan horse malware that replicates itself.
Worm
AI generated video or image.
Deep Fake
Multiple systems flood bandwidth or resources of a system.
DDoS
Someone who illegally breaches and steals information and data from others.
Hacker
Malware that pretends to be a real program.
Trojan Horse
A type of trojan horse malware that replicates itself.
BYOD
A security exercise where a cybersecurity expert attempts to find an exploit or vulnerabilities in a computer system.
Penetration Test