cybersecurity - Concepts
Explore concepts tagged with "cybersecurity"
Total concepts: 21
Concepts
- Watering Hole Attack - An attack that compromises websites frequently visited by a target group to infect their systems.
- Man-in-the-Middle Attack - An attack where the attacker secretly intercepts and potentially alters communication between two parties
- Social Engineering - Psychological manipulation of people into performing actions or divulging confidential information.
- Trojan Horse - Malware disguised as legitimate software that performs malicious actions once installed
- Computer Worm - Self-replicating malware that spreads across networks without requiring user action or host programs
- Phishing - Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
- Vishing - Voice phishing - using phone calls to deceive victims into revealing sensitive information or taking harmful actions.
- Botnet - A network of compromised computers controlled remotely to perform coordinated malicious activities
- Ransomware - Malware that encrypts victim's data and demands payment for the decryption key
- Whaling - Phishing attacks specifically targeting high-profile executives, senior management, and other 'big fish' in organizations.
- DDoS Attack - An attack that overwhelms systems with traffic from multiple sources to make services unavailable
- Brute Force Attack - An attack method that systematically tries all possible combinations to crack passwords or encryption
- Smishing - SMS phishing - using text messages to trick victims into clicking malicious links or revealing sensitive information.
- Advanced Persistent Threat - A prolonged, targeted cyberattack where intruders gain access and remain undetected for extended periods.
- Zero-Day Vulnerability - A software vulnerability unknown to the vendor, exploitable before a patch is available
- Pretexting - Creating a fabricated scenario or false identity to manipulate victims into providing information or access.
- Computer Virus - Self-replicating malware that spreads by inserting copies of itself into other programs or files
- Quishing - QR code phishing - using malicious QR codes to redirect victims to phishing websites or trigger harmful actions.
- Spear Phishing - Targeted phishing attacks directed at specific individuals or organizations using personalized information.
- Malware - Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems
- Supply Chain Attack - An attack that targets less-secure elements in the supply chain to compromise the final product or service
← Back to all concepts