30 Cybersecurity Terms

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

Advanced Persistent Threat (APT)

A prolonged and targeted cyberattack where an intruder gains access to a network and remains hidden. These attacks often try to steal sensitive information. Highly skilled and well-funded groups typically execute them.

2
New cards

Antivirus Software

Designed to detect, prevent, and remove malware (malicious software) from your computer. In 2024, using this is still critical in protecting your devices from threats like viruses, worms, and trojans.

3
New cards

Artificial Intelligence (AI) in Cybersecurity

It is increasingly being used in everything from cybersecurity to design. When used to detect and respond to threats, it can analyze patterns in data to identify unusual activity that may indicate a cyberattack. Today, these cybersecurity tools are becoming more common in personal and organizational security measures.

4
New cards

Black Hat Hackers

Cybercriminals who find and use weaknesses in networks and systems. They break the law to steal data or spread malware.

5
New cards

Botnet

A network of computers infected with malware and controlled remotely by a hacker. They are often used to launch large-scale attacks, like sending spam or executing Distributed Denial of Service (DDoS) attacks.

6
New cards

Bring Your Own Device (BYOD)

Refers to employee use of personal mobile devices for work purposes. While this can increase productivity, it also introduces security risks if the devices are not properly secured.

7
New cards

Clickjacking

A type of cyberattack in which an attacker tricks a user into clicking on something other than what they expect. This can lead to accidentally downloading malware or sharing sensitive information.

8
New cards

Cyberbullying

Involves the use of digital platforms, like social media or messaging apps, to harass, threaten, or intimidate someone. This can have severe emotional and psychological effects on victims.

9
New cards

Data Breach

Occurs when unauthorized individuals access personal data, financial records, or login credentials. They have become increasingly common, with millions of records exposed (6,845,908,997 and counting) in recent years.

10
New cards

Deepfake

AI-generated videos or images that realistically and convincingly alter reality. These can be used to spread misinformation, commit fraud, or manipulate individuals. As this technology advances, it’s becoming harder to distinguish between real and fake media.

11
New cards

Distributed Denial of Service (DDoS) Attack

This attack happens when someone floods a target with a huge amount of internet traffic. This makes using the service hard or even impossible for real users.

12
New cards

Encryption

Prevents unauthorized access by converting data into a code. This essential tool protects sensitive information, like credit card numbers or personal messages, especially when transmitted over the Internet.

13
New cards

Firewall

A security system that monitors and controls the traffic entering and leaving a network based on set rules. It is crucial for protecting networks from unauthorized access and various cyber threats.

14
New cards

Internet of Things (IoT) Security

A cybersecurity strategy to protect internet-connected devices, like smart home gadgets, from cyberattacks. These devices were not created with security in mind, leaving them vulnerable to attacks. As more devices become connected, more personal information is at risk. Ensuring the security of these devices has become increasingly important

15
New cards

IP Address

A unique string of numbers assigned to each device connected to the internet. It allows devices to communicate with each other. Cybercriminals can use these to track online activity or launch attacks.

16
New cards

Machine Learning (ML)

A subset of AI, involves creating algorithms that can learn from and make predictions based on data. In cybersecurity, this is used to detect new types of threats by analyzing patterns and identifying anomalies in data.

17
New cards

Malware

Software designed to harm or exploit any programmable device, service, or network. Common types of this include viruses, worms, ransomware, and spyware. In 2024, it will remain a major threat to individuals and organizations.

18
New cards

Man-in-the-Middle (MITM) Attack

This attack results from a cybercriminal hacking communication between two parties without their knowledge. This type of attack can result in the theft of sensitive data, such as login credentials or credit card numbers.

19
New cards

Multi-Factor Authentication (MFA)

An extra layer of security that requires multiple verification methods to confirm a user’s identity. For example, you might need to enter a password followed by a code sent to your phone. It is increasingly recommended as a way to protect online accounts.

20
New cards

Password Management Tools

They can be used to securely store and create strong passwords. Because creating new passwords for every account is crucial, having this can help keep track of sign-on information to log in faster while making it harder for cybercriminals to access accounts.

21
New cards

Phishing

A cyberattack that attempts to trick people into providing personal information, such as passwords or credit card numbers, by pretending to be a legitimate source, like a bank or social media site. It remains one of the most common methods cybercriminals use to steal information.

22
New cards

Public Wi-Fi Networks

Convenient but often unsecured. Cybercriminals can exploit these networks to conduct attacks, such as man-in-the-middle attacks. Using a VPN (Virtual Private Network) on this can help protect your data.

23
New cards

Ransomware

Malware that locks you out of your computer or files and demands a ransom, usually in cryptocurrency, to restore access. In recent years, these attacks have targeted individuals and large organizations, causing billions of dollars in losses.

24
New cards

Security Awareness Training

Educates people on recognizing and responding to cybersecurity threats. In many organizations, this is critical for preventing attacks that exploit human error, such as phishing or social engineering.

25
New cards

Smishing

A form of phishing that uses text messages to trick individuals into providing sensitive information or downloading malicious software. As mobile phone usage increases, this has become a growing threat.

26
New cards

Social Engineering

A tactic used by cybercriminals to manipulate individuals into revealing confidential information or performing actions that compromise security. This method often exploits human emotions, such as fear or urgency, to achieve its goals.

27
New cards

Spyware

Software that secretly monitors your computer activity and collects personal information, such as browsing habits or passwords, without your consent. It is often used for malicious purposes, like identity theft.

28
New cards

Virtual Private Network (VPN)

A service that creates a secure, encrypted connection over the internet. It’s especially useful when using public Wi-Fi networks, as it helps protect your data from cybercriminals who may be trying to intercept it.

29
New cards

Vishing (voice phishing)

Involves using phone calls or voice messages to trick individuals into providing personal information, such as bank details or passwords. These attacks often use social engineering techniques to convince victims to share sensitive data.