search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Cybersecurity Terminology Breach Cloud Dark web Exploit Firewall Hacker IP Address Malware Phishing Ransomware Threat


Two-factor authentication


Virus Worm


The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.


A technology that allows us to access our files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.


A set of encrypted networks that have been intentionally hidden from view and require special software to access.


A malicious application or script that can be used to take advantage of a computer’s vulnerability.


Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.


Someone who violates computer security for malicious reasons, kudos or personal gain.


An internet version of a home address for your computer, which is identified when it communicates over a network.


An umbrella term that describes all forms of malicious software designed to wreak hav- oc on a computer. Common forms include: viruses, trojans, worms & ransomware.


Method used by criminals to try to obtain financial or other confidential information from internet users, usually by sending an email that looks as though it has been sent by a legitimate organization. The email usually contains a link to a fake website that looks authentic.


A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.


A cyberattack that causes an accident, often called an incident.


Obtaining evidence of identity by two independent means, such as knowing a password and receiving a code texted to your smartphone.


Malware that is loaded onto a computer and then run without the user’s knowledge or knowledge of its full effects.


Malware that replicates itself so it can spread to infiltrate other computers.


Mar/Apr | The Retailer Magazine | 19


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36