CIA
Confidentiality, Integrity, Availability
This is a computer program malware requires user interaction to activate or spread
Virus
This is a person who breaks into a computer system for politically or socially motivated purposes
Hacktivist
Four things complex passwords should include.
Upper case, lower case, number, special characters
Scouring the thrash for sensitive information
Dumpster diving
DDoS
Distributed Denial of Service
Denies access to your important data
Ransomware
They are people who hack for fun.
Thrill Seekers
A password attack that tries every possible combination of letters and numbers
Brute Force
Bad spelling and grammar, a link to click so that you can update your information, or a request for personal information are all examples of these.
Phishing email
SOC
Security Operations Center
This malware self replicates without user interaction
Worm
This is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside
Insider threat
software installed on another person's computer to record that person's keystrokes.
Keylogger
An attacker puts a 2TB USB in the parking lot
Baiting
PII
Personally Identifiable Information
collects user activity data without their knowledge
Spyware
They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.
state sponsored hacking
To initiate this attack, the hacker tries a long list of common words, together with numbers before or after them like people often use.
Dictionary Attack
Targeted malicious email against the CEO
Whaling
SSO
Single Sign-On
This malware disguises itself as desirable code
Trojan
These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.
Organized crime groups
After entering your username/password you're then asked to confirm your identity a second way.
Two-factor/Multifactor authentication
inventing a scenario to convince victims to divulge information they should not divulge.
Pretexting