Cybersecurity Terminology Breach Cloud Dark web Exploit Firewall Hacker IP Address Malware Phishing Ransomware Threat

Two-factor authentication

Virus Worm

The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.

A technology that allows us to access our files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.

A set of encrypted networks that have been intentionally hidden from view and require special software to access.

A malicious application or script that can be used to take advantage of a computer’s vulnerability.

Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.

Someone who violates computer security for malicious reasons, kudos or personal gain.

An internet version of a home address for your computer, which is identified when it communicates over a network.

An umbrella term that describes all forms of malicious software designed to wreak hav- oc on a computer. Common forms include: viruses, trojans, worms & ransomware.

Method used by criminals to try to obtain financial or other confidential information from internet users, usually by sending an email that looks as though it has been sent by a legitimate organization. The email usually contains a link to a fake website that looks authentic.

A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.

A cyberattack that causes an accident, often called an incident.

Obtaining evidence of identity by two independent means, such as knowing a password and receiving a code texted to your smartphone.

Malware that is loaded onto a computer and then run without the user’s knowledge or knowledge of its full effects.

Malware that replicates itself so it can spread to infiltrate other computers.

Mar/Apr | The Retailer Magazine | 19

Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36