Cyber Threats
Hacker Types & Intentions
Cyber Attacks & Tactics
Protection & Defense
Cyber Roles & Practices
Everday Cyber Concepts
100

Harmful software designed to damage systems

Malware

100

Ethical hacker who helps improve security

White Hat

100

Email scam that tricks users into giving info

Phishing

100

Software that detects and removes malware

Antivirus

100

Expert who protects systems from threats

Cybersecurity Analyst

100

Stealing someone's personal information

Identity Theft
200

Malware that locks files for payment

Ransomware

200

Hacker who breaks into systems for malicious reasons

Black Hat

200

Voice-based scam to steal personal info

Vishing

200
Scrambles data to protect it from hackers

Encryption

200

Simulated cyberattack to test defenses

Penetration Testing

200

Unwanted or junk messages, often emails

Spam

300

Self-replicating program that harms computers

Virus

300

Hacker who violates rules but not for harm

Gray Hat

300

Overwhelms servers by flooding them with traffic

DDoS

300

Unlocking or decoding secured data

Decryption

300

Verifying identity before granting access

Authentication

300

Entering a system without permission  

Unauthorized Access

400

Software that secretly collects user data

Spyware

400

Pretending to be someone else online

Catfishing

400

Hacker secretly intercepts data between two parties

Man-in-the-middle

400

Secures internet use by hiding IP address

VPN

400

Tool used to capture network traffic

Packet Sniffer

400

Small files websites store on your computer

Cookies

500

Pops up unwanted ads on devices

Adware

500

Manipulating people to get confidential info

Social Engineering

500

Guessing passwords repeatedly until success

Brute Force Attack

500

Stores and protects multiple passwords securely

Password Manager

500

Secretly listening to private data transfers

Eavesdropping

500

Weak point that can be exploited by attackers

Vulnerability

600

Network of infected computers controlled remotely

Botnet

600

Faking identity to deceive systems or users

Spoofing

600

Misleading headline to trick people into clicking

Clickbait

600

Restricting who can view or use resources

Access Control

600

Hidden entry into a system bypassing normal login

Backdoor

600

All online activity linked to a person

Digital Footprint