Digital Security Risk
Any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.
Cybercrime
Online or Internet-based illegal acts, such as distributing malicious software or committing identity theft.
Data Mining
The process of sifting through Big Data to find important questions that yield fruitful results.
Social Engineering
A category of attack that attempts to trick the victim into giving valuable information to the attacker.
Digital Forensics
The discovery, collection, and analysis of evidence found on computers and networks.
Malware
Short for malicious software, it consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices.
Botnet
A group of compromised computers or mobile devices connected to a network that are used to attack other networks.
Denial of Service (DoS) Attack
An attack that overloads a server with network traffic so that it cannot provide necessary services.
Two-Factor Authentication (2FA)
A security process in which the user provides two different authentication factors to verify themselves.
Cloud Computing
The delivery of various services over the internet, including data storage and computing power.
Virus
A type of malware that attaches itself to a legitimate program or file, allowing it to spread from one computer to another.
Worm
A standalone malware that replicates itself to spread to other computers without needing to attach to a program.
Trojan Horse
A type of malware that disguises itself as a legitimate application to trick users into installing it.
Ransomware
Malware that encrypts a victim's files and demands payment for the decryption key.
Spyware
Malware that secretly monitors user activity and collects personal information.
Adware
Software that automatically delivers advertisements, which can sometimes include malware.
Rootkit
A type of malware designed to gain unauthorized access to a computer while hiding its presence.
Phishing
A type of cyber attack where attackers pose as trustworthy entities to steal sensitive information, usually through deceptive emails.
Identity Theft
The deliberate use of someone else's identity, usually for financial gain or fraud.
Data Breach
An incident where unauthorized access to data occurs, leading to exposure of sensitive or confidential information.
Privacy Violation
The unauthorized access or use of personal information, potentially leading to identity theft or other harm.
Software Vulnerabilities
Weaknesses or flaws in software that can be exploited by attackers to gain unauthorized access or cause harm.
Insider Threats
Security risks that originate from within the organization, often involving employees or contractors misusing their access.
Social Media Risks
Potential dangers stemming from personal information shared on social media platforms, including oversharing and cyberbullying.
Unpatched Software
Software that has not been updated to fix vulnerabilities, leaving it susceptible to attacks.