Essential Vocabulary for Understanding Cybercrime

The fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.

The fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.

"Many users have fallen victim to phishing attacks via deceptive emails."

Software designed to disrupt, damage, or gain unauthorized access to computer systems.

Software designed to disrupt, damage, or gain unauthorized access to computer systems.

"The company's network was compromised by malware, leading to a significant data breach."

A type of malware that encrypts the victim's data and demands payment for the decryption key.

A type of malware that encrypts the victim's data and demands payment for the decryption key.

"The hospital had to pay a hefty sum to regain access to its files after a ransomware attack."

An attack where multiple compromised systems target a single system, causing a denial of service.

An attack where multiple compromised systems target a single system, causing a denial of service.

"The website was rendered inaccessible due to a massive DDoS attack."

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

"Installing a firewall is essential to protect your network from external threats."

The process of converting information or data into a code to prevent unauthorized access.

The process of converting information or data into a code to prevent unauthorized access.

"All sensitive data should be stored with strong encryption to ensure security."

A person who uses computers to gain unauthorized access to data.

A person who uses computers to gain unauthorized access to data.

"The hacker was able to exploit a vulnerability in the software to steal information."

A type of malware that misleads users of its true intent, often disguised as legitimate software.

A type of malware that misleads users of its true intent, often disguised as legitimate software.

"The malicious Trojan horse software caused irreversible damage to the user's files."

Software that enables a user to obtain covert information about another's computer activities.

Software that enables a user to obtain covert information about another's computer activities.

"Spyware can track your internet activity and steal personal information."

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.

"The cybercriminal used a botnet to launch widespread cyber attacks."