General Cybersecurity
Vocabulary
Hacking
Malware
Types of Attacks
100

Identify, Protect, Detect, Respond, Recovery

Cybersecurity Lifecycle


100

a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.

Script Kiddie


100

The art of manipulating people so they give up confidential information, which includes your passwords, bank information, or access to your computer

Social Ideology

100

This type of malware can occur if a legitimate advertisement is clicked

Adware
100

 Software that replicates and infects many computers, turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.

Botnet

200

server/computer that contains all the resources for the users of the LAN 

 It’s devices are organized and connected by the system administrator 

Properties of LANS


200

a cyber security risk that originates from within an organization. It typically occurs when a current or former employee, contractor, vendor or partner with legitimate user credentials misuses their access to the detriment of the organization's networks, systems and data.

Insider

200

 Companies steal information from competitors to gain the upper hand or eliminate the competition

Industry espionage

200

This type of malware does not need a user to spread it can replicate and infect  other computers

Worm

200

Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive Information

Keylogger

300

The term used to describe weaknesses in a system that allows an unauthorized

Vulnerabilities

300

Derived from combining the words 'Hack' and 'Activism', hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The individual who performs an act of hacktivism is said to be a hacktivist.

Hacktivist

300

Criminals steal money from individuals and corporations, such as banks and lending houses.

Financial gain

300

 A malicious program that disguises itself as a legitimate software that  users believe they installed

Trojan Horse

300

the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties

Man in the middle

400

A device that forwards data packets to networks

Function of a router

400

 Global cyber syndicates are. organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct, including identity theft, online fraud, and computer extortion for monetary gain.

Cyber Syndicate

400

 An "insider", meaning an employee of an organization, exposes an injustice or some criminal behavior that the organization is committing

Whistleblower

400

Software that secretly collects information on you

Spyware

400

Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it. Ransomware can spread like a virus, worm, or Trojan horse.

Ransomware

500

HTTP Port

Port 80

500

 the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.

Warfare/Espionage


500

a method where cybercriminals flood a network with so much malicious traffic that it cannot operate or communicate as it normally would. This causes the site's normal traffic, also known as legitimate packets, to come to a halt

DDoS Attacks

500

This type of malware’s sole purpose is meant to be intimidating and are  almost never legitimate. They are often difficult to dismiss and won’t cancel. Often  install malware.

Pop ups

500

a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.

Rootkit