Looks like no one added any tags here yet for you.
Cyber Security
the security offered through on-line services to protect your online information
Data Breach
the intentional or unintentional release of secure or private/confidential information to an untrusted environment
Attack Surface
the sum of the different points where an unauthorized user can try to enter data to or extract data from an environment
Hackers
person who breaks into computers, usually by gaining access to administrative controls
Black Hat
stereotypical hacker
motives are financial gain
aims to break into your accounts and steal bank details and other confidential data
White Hat
desires to help businesses and protect them against cyber threats
Certified Ethical Hacker (CEH)
qualification given to white hackers from the EC Council
Grey Hat
motives are just for personal enjoyment, they make up most of the hacking community
Virus
malicious program designed to take control of system and destroy data
loaded onto your computer without your consent
human made and designed to spread to other computer users through networks and e-mails
Trojan
program designed to allow remote access to a computer system
seemingly harmless and hidden in an application
installed on the target system when the user opens the application
does not replicate itself like virus and worms
Malware
any malicious program that causes harm to a computer system or network
Worms
self-replicating programs that consumes systems
has ability to spread without end-user action (unlike viruses)
Adware
automatically displays or downloads advertisements
Spyware
secretly placed on your system and gathers personal or private information without your consent or knowledge
Cybercrime
criminal activity that either targets or uses a computer, a computer network or a networked device
Cryptocurrency
digital currency that can be used to buy goods and services
Bitcoin
the most recognizable and the most closely associated with the cryptocurrency system
Cyberextortion
demanding money to prevent a threatened attack
Cyberespionage
where hackers access government or company data
Phishing
is the fraudulent attempt to obtain sensitive information by impersonating oneself as a trustworthy entity in digital communication
Cookies
small text files that contain information pertaining to web site activity
Firewall
a security barrier that filters and controls the flow of information coming into and out of a private network
Social Engineering
is the practice of tricking users into giving out passwords or other types of access information
Baiting
involves creating a trap, such as a USB stick loaded with malware
Pretexting
uses a pretext to gain attention and hook the victim into providing information
Backup
a duplicate copy of a program, a disk, or data, made either for archiving purposes or for safeguarding files from loss if the active copy is damaged or destroyed
Windows Back Up and Restore
feature from Windows 7 that configures Windows to automatically create a weekly backup of all important files on the computer
Windows runs a backup every Sunday at 7PM
File History in Windows 10
configures Windows 10 to automatically create an hourly backup of your personal files whenever the destination media is connected to the PC