1
Psychological manipulation of people into performing actions or divulging confidential information.
2
The ability of a resource to be accessed, often expressed as a time period.
3
Determining the identity or location of an attacker or an attacker’s intermediary.
4
type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
5
an attack where the attacker disguises himself or herself as another user by means of a false IP network address
6
method by which information is converted into secret code that hides the information's true meaning
7
A crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
8
A politically- or ideologically-motivated cyber attack or hack
9
the process of taking over a live connection between two users so that the attacker can masquerade as one of the users
10
gaining unauthorized access to a computer system via another user's legitimate connection
11
Amassed data that is used to describe large amounts of other Internet data
12
Type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
13
a device designed to enforce the boundary between two or more networks, limiting access
14
term used to describe a hacker who has the intention of causing damage or stealing information
15
a private network used within a company or organization that is not connected to the Internet
16
a program designed to capture information across a computer network
17
a data string used to verify the identity of a user
18
networks from compromised computers that are controlled externally by remote hackers.
19
An information packet sent from a website to a web browser that records a user’s activity on that website.
20
A program that masks something harmful, such as a worm or virus, that it carries into a device.
21
Computer Incident Response Team
22
a computer system that resides on a network and can independently communicate with other systems on the network
23
A software robot that performs automated tasks.