backdoor
an alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
breach
The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
bug
An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction
data breach
When sensitive, protected, or confidential information is intentionally released to an untrusted environment
data encryption
Transforming data in such a way that only approved parties can decrypt and access it.
ethical hacking
The practice of locating vulnerabilities and weaknesses in information systems and computers by duplicating the actions and intent of malicious hackers who seek to bypass security and search for gaps in systems that can be exploited.
firewall
A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
hacker
A cyber attacker who uses software and social engineering methods to steal data and information.
insider threat
A malicious threat to a group or organization that comes from someone within, like an employee, contractor, or business associate, who has insider information regarding the organization’s data, computer systems, or security measures
malware
Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
phishing
The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
ransomware
A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
skynet
A fictional distributed artificial intelligence system that is aware of the physical world and can act through robots and computer control systems.
spyware
A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.