1/28
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Advanced Persistent Threat (APT)
A prolonged and targeted cyberattack where an intruder gains access to a network and remains hidden. These attacks often try to steal sensitive information. Highly skilled and well-funded groups typically execute them.
Antivirus Software
Designed to detect, prevent, and remove malware (malicious software) from your computer. In 2024, using this is still critical in protecting your devices from threats like viruses, worms, and trojans.
Artificial Intelligence (AI) in Cybersecurity
It is increasingly being used in everything from cybersecurity to design. When used to detect and respond to threats, it can analyze patterns in data to identify unusual activity that may indicate a cyberattack. Today, these cybersecurity tools are becoming more common in personal and organizational security measures.
Black Hat Hackers
Cybercriminals who find and use weaknesses in networks and systems. They break the law to steal data or spread malware.
Botnet
A network of computers infected with malware and controlled remotely by a hacker. They are often used to launch large-scale attacks, like sending spam or executing Distributed Denial of Service (DDoS) attacks.
Bring Your Own Device (BYOD)
Refers to employee use of personal mobile devices for work purposes. While this can increase productivity, it also introduces security risks if the devices are not properly secured.
Clickjacking
A type of cyberattack in which an attacker tricks a user into clicking on something other than what they expect. This can lead to accidentally downloading malware or sharing sensitive information.
Cyberbullying
Involves the use of digital platforms, like social media or messaging apps, to harass, threaten, or intimidate someone. This can have severe emotional and psychological effects on victims.
Data Breach
Occurs when unauthorized individuals access personal data, financial records, or login credentials. They have become increasingly common, with millions of records exposed (6,845,908,997 and counting) in recent years.
Deepfake
AI-generated videos or images that realistically and convincingly alter reality. These can be used to spread misinformation, commit fraud, or manipulate individuals. As this technology advances, it’s becoming harder to distinguish between real and fake media.
Distributed Denial of Service (DDoS) Attack
This attack happens when someone floods a target with a huge amount of internet traffic. This makes using the service hard or even impossible for real users.
Encryption
Prevents unauthorized access by converting data into a code. This essential tool protects sensitive information, like credit card numbers or personal messages, especially when transmitted over the Internet.
Firewall
A security system that monitors and controls the traffic entering and leaving a network based on set rules. It is crucial for protecting networks from unauthorized access and various cyber threats.
Internet of Things (IoT) Security
A cybersecurity strategy to protect internet-connected devices, like smart home gadgets, from cyberattacks. These devices were not created with security in mind, leaving them vulnerable to attacks. As more devices become connected, more personal information is at risk. Ensuring the security of these devices has become increasingly important
IP Address
A unique string of numbers assigned to each device connected to the internet. It allows devices to communicate with each other. Cybercriminals can use these to track online activity or launch attacks.
Machine Learning (ML)
A subset of AI, involves creating algorithms that can learn from and make predictions based on data. In cybersecurity, this is used to detect new types of threats by analyzing patterns and identifying anomalies in data.
Malware
Software designed to harm or exploit any programmable device, service, or network. Common types of this include viruses, worms, ransomware, and spyware. In 2024, it will remain a major threat to individuals and organizations.
Man-in-the-Middle (MITM) Attack
This attack results from a cybercriminal hacking communication between two parties without their knowledge. This type of attack can result in the theft of sensitive data, such as login credentials or credit card numbers.
Multi-Factor Authentication (MFA)
An extra layer of security that requires multiple verification methods to confirm a user’s identity. For example, you might need to enter a password followed by a code sent to your phone. It is increasingly recommended as a way to protect online accounts.
Password Management Tools
They can be used to securely store and create strong passwords. Because creating new passwords for every account is crucial, having this can help keep track of sign-on information to log in faster while making it harder for cybercriminals to access accounts.
Phishing
A cyberattack that attempts to trick people into providing personal information, such as passwords or credit card numbers, by pretending to be a legitimate source, like a bank or social media site. It remains one of the most common methods cybercriminals use to steal information.
Public Wi-Fi Networks
Convenient but often unsecured. Cybercriminals can exploit these networks to conduct attacks, such as man-in-the-middle attacks. Using a VPN (Virtual Private Network) on this can help protect your data.
Ransomware
Malware that locks you out of your computer or files and demands a ransom, usually in cryptocurrency, to restore access. In recent years, these attacks have targeted individuals and large organizations, causing billions of dollars in losses.
Security Awareness Training
Educates people on recognizing and responding to cybersecurity threats. In many organizations, this is critical for preventing attacks that exploit human error, such as phishing or social engineering.
Smishing
A form of phishing that uses text messages to trick individuals into providing sensitive information or downloading malicious software. As mobile phone usage increases, this has become a growing threat.
Social Engineering
A tactic used by cybercriminals to manipulate individuals into revealing confidential information or performing actions that compromise security. This method often exploits human emotions, such as fear or urgency, to achieve its goals.
Spyware
Software that secretly monitors your computer activity and collects personal information, such as browsing habits or passwords, without your consent. It is often used for malicious purposes, like identity theft.
Virtual Private Network (VPN)
A service that creates a secure, encrypted connection over the internet. It’s especially useful when using public Wi-Fi networks, as it helps protect your data from cybercriminals who may be trying to intercept it.
Vishing (voice phishing)
Involves using phone calls or voice messages to trick individuals into providing personal information, such as bank details or passwords. These attacks often use social engineering techniques to convince victims to share sensitive data.