Cyber Security
Bots
A bot is an automated program that runs over the Internet
Back Doors
A feature or defect of a computer system that allows surreptitious unauthorized access to data
Intranet
A local or restricted communications network, especially a private network created using World Wide Web software
Gateway
A network point that acts as an entrance to another network
Hacker
A person who uses computers to gain unauthorized access to data
Cyber Exercise
A planned event during which an organization simulates a cyber disruption to develop or test capabilities
Trojan Horse
A program that claims to rid your computer of viruses but instead introduces viruses onto your computer
Blended Threats
A software exploit which in turns involves a combination of attacks against different vulnerabilities
Virus
Computer viruses are small programs or scripts that can negatively affect the health of your computer.
Antivirus Software
Designed to detect and destroy computer virus
Encryption
Encryption is the process of converting data to an unrecognizable or "encrypted" form. It is commonly used to protect sensitive information so that only authorized parties can view it
Internet
Is global system of interconnected computer networks that use the internet protocol suite
Cybersecurity
Is the body of technology's, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
Firewall
It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
Worm
Self replicating virus that does not alter files but resides in active memory and duplicates itself
Spyware
Software that enables a user to obtain convert information about another's computer activities by transmitting data from their hard drive
Malware
Software that is intended to damage or disable computers and computer systems
Phishing
The activity of defrauding an online account holder of financial information by posing as a legitimate company
Keylogger
Type of surveillance software that has the capability to record every key stroke you make on a Log file, usually encrypted