Cyber-attack - Malicious attempts to damage, disrupt or gain unauthorised access to computer systems, networks or devices.
Denial of service (DoS) - When legitimate users are denied access to computer services (or resources.) This is usually done by overloading the service with requests.
Digital footprint - The record of digital information which a user's online activity leaves behind.
Phishing - Untargeted, mass emails sent to many people asking for sensitive information (such as bank details) or encouraging them to visit a fake website.
Spear-phishing - A more targeted form of phishing, where the email is designed to look like it's from a person the recipient knows and/or trusts.
Whaling - Highly targeted phishing attacks (masquerading as legitimate emails.)
Ransomware - Is a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
Social engineering - Manipulating people into carrying out specific actions, or into divulging sensitive information that is of use to the attacker.
Trojan - A type of malware or virus disguised as legitimate software, that is used to hack into the victim's computer.
Water-holing - Setting up a fake website (or compromising a real one) in order to exploit visiting users.
Botnet - A network of infected devices, connected to the Internet, used to commit coordinated cyber attacks without their owner's knowledge.
Zero-day - Recently discovered vulnerabilities (or bugs), not yet known to vendors or antivirus companies, that hackers can exploit.
Hope you find this glossary useful.
For help and advice on protecting your business from cyber crime please call us on 01273 384100 or email us at sales@cnc-ltd.co.uk.
|