Cyber Thesaurus - Vocabulary Pt.1

Cyber-security has its own intimidating jargon.  You’ll be better equipped to address your cyber risks when you know some of the the terminology.

DDoS. Distributed Denial of Service attacks are designed to knock a network offline. Usually, the attack takes advantage of multiple compromised systems to cause a system-wide shut-down. DDoS attacks are often used as decoys to distract system administrators from noticing other suspicious activity, like a data breach.

Phishing. One of the most common types of cyber-attacks. An email appears to come from a verified sender. When the recipient opens the email and clicks on a link or an attachment, malware gets to work capturing and exporting data. 
Phishing scams may also introduce a ransomware attack.

Ransomware. A software attack that either locks the targeted user from data or threatens to publish it unless a ransom is paid. Sophisticated ransomware attacks use a technique called crypto-viral extortion to encrypt data, making files virtually impossible to recover without a decryption key.

Whaling. A more sophisticated style of phishing, whaling attacks target senior management, such as CEOs or CFOs, who have administrative privileges and access to valuable data like company financial or personnel information.

Associations Now

You Might Also Read: 

The New Face of Cybersecurity:

 

« Russia Is Building A Separate Military Cloud
Facebook Admits Privacy Settings 'Bug' Affects 14 Million Users »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Zybert Computing

Zybert Computing

Zybert Computing provide server solutions with built-in security and information protection features for the SME market.

European Data Protection Supervisor (EDPS)

European Data Protection Supervisor (EDPS)

The EDPS is an independent supervisory authority devoted to protecting personal data and privacy and promoting good practice in the EU institutions and bodies.

Lantronix

Lantronix

Lantronix is a global provider of secure data access and management solutions for Internet of Things (IoT) and information technology assets.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Bugsec Group

Bugsec Group

BugSec is revolutionizing the field of cybersecurity by providing attack-oriented defensive strategies, delivered by the leading cyber experts.

Immunity Services

Immunity Services

Immunity Services offers a comprehensive range of penetration testing and vulnerability assessment consulting services.

Cobalt Strike

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

FFRI

FFRI

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.