Harmful software designed to damage systems
Malware
Ethical hacker who helps improve security
White Hat
Email scam that tricks users into giving info
Phishing
Software that detects and removes malware
Antivirus
Expert who protects systems from threats
Cybersecurity Analyst
Stealing someone's personal information
Malware that locks files for payment
Ransomware
Hacker who breaks into systems for malicious reasons
Black Hat
Voice-based scam to steal personal info
Vishing
Encryption
Simulated cyberattack to test defenses
Penetration Testing
Unwanted or junk messages, often emails
Spam
Self-replicating program that harms computers
Virus
Hacker who violates rules but not for harm
Gray Hat
Overwhelms servers by flooding them with traffic
DDoS
Unlocking or decoding secured data
Decryption
Verifying identity before granting access
Authentication
Entering a system without permission
Unauthorized Access
Software that secretly collects user data
Spyware
Pretending to be someone else online
Catfishing
Hacker secretly intercepts data between two parties
Man-in-the-middle
Secures internet use by hiding IP address
VPN
Tool used to capture network traffic
Packet Sniffer
Small files websites store on your computer
Cookies
Pops up unwanted ads on devices
Adware
Manipulating people to get confidential info
Social Engineering
Guessing passwords repeatedly until success
Brute Force Attack
Stores and protects multiple passwords securely
Password Manager
Secretly listening to private data transfers
Eavesdropping
Weak point that can be exploited by attackers
Vulnerability
Network of infected computers controlled remotely
Botnet
Faking identity to deceive systems or users
Spoofing
Misleading headline to trick people into clicking
Clickbait
Restricting who can view or use resources
Access Control
Hidden entry into a system bypassing normal login
Backdoor
All online activity linked to a person
Digital Footprint