Cybersecurity Terminology Breach Cloud Dark web Exploit Firewall Hacker IP Address Malware Phishing Ransomware Threat
Two-factor authentication
Virus Worm
The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
A technology that allows us to access our files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.
A set of encrypted networks that have been intentionally hidden from view and require special software to access.
A malicious application or script that can be used to take advantage of a computer’s vulnerability.
Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
Someone who violates computer security for malicious reasons, kudos or personal gain.
An internet version of a home address for your computer, which is identified when it communicates over a network.
An umbrella term that describes all forms of malicious software designed to wreak hav- oc on a computer. Common forms include: viruses, trojans, worms & ransomware.
Method used by criminals to try to obtain financial or other confidential information from internet users, usually by sending an email that looks as though it has been sent by a legitimate organization. The email usually contains a link to a fake website that looks authentic.
A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
A cyberattack that causes an accident, often called an incident.
Obtaining evidence of identity by two independent means, such as knowing a password and receiving a code texted to your smartphone.
Malware that is loaded onto a computer and then run without the user’s knowledge or knowledge of its full effects.
Malware that replicates itself so it can spread to infiltrate other computers.
Mar/Apr | The Retailer Magazine | 19
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36