Page 2 - Cybersecurity

Cybersecurity 2 1
What Is Cybersecurity

What Is Cybersecurity?

Difficulty: Easy

Cybersecurity is the practice of using measures to protect systems and networks against the unauthorised or criminal use of data and malicious attacks.

Top 10 Scariest Facts About The Internet

Top 10 Scariest Facts About The Internet

Difficulty: Easy

The internet has become a very useful method of sharing files, resources, and other information with people all around the world. However, it is unfortunate that people also use it for malicious purposes.

What Is A Cyberattack

What Is A Cyberattack?

Difficulty: Easy

A cyberattack is an intentional attempt to disrupt or harm a computer system or network. Cyberattacks are performed by cybercriminals with malicious intent.

What Is Cybercrime

What Is Cybercrime?

Difficulty: Easy

Cybercrime is a type of criminal activity carried out by a computer and a network. A person that engages in cybercrime is known as a cybercriminal.

What Is An Internet Troll

What Is An Internet Troll?

Difficulty: Medium

An internet troll is a person online who intentionally causes disruption by posting off-topic, upsetting, controversial, or disturbing content or messages in order to get a reaction out of people.

What Is Clickjacking

What Is Clickjacking?

Difficulty: Medium

Clickjacking, also known as a user interface redress attack, or UI redressing, is the practice of using multiple invisible user interface layers to trick users into clicking....

What Is Cyberstalking

What Is Cyberstalking?

Difficulty: Medium

Cyberstalking is a form of stalking that happens electronically over the internet or on a mobile phone. The anonymity of online communication has made it easy for cyberstalkers to...

What Is Phreaking

What Is Phreaking?

Difficulty: Medium

Phreaking is the act of exploiting vulnerabilities in telephone systems to gain unauthorised access to restricted telephone services or areas, often to obtain free phone calls.

What Is A Hacker

What Is A Hacker?

Difficulty: Easy

A hacker is a person that uses their technical skills to gain unauthorised access to computer systems. Hackers can gain unauthorised access to systems in...

What Is Spam

What Is Spam?

Difficulty: Easy

Spam is a form of unsolicited and unwanted online communication sent to an individual or a large number of individuals that can be distributed through email messages, instant messaging sessions...

What Is A Watering Hole Attack

What Is A Watering Hole Attack?

Difficulty: Medium

A watering hole attack is a type of cyberattack where the attacker identifies websites that are commonly visited by members of an organisation and infects them with malware.

What Is An Email Bomb

What Is An Email Bomb?

Difficulty: Medium

An email bomb, also known as a mail bomb, is a type of cyberattack where the attacker sends a large number of email messages to one or more email addresses to flood the mailboxes.

What Is A Potentially Unwanted Program

What Is A Potentially Unwanted Program?

Difficulty: Medium

A potentially unwanted program, also known as a potentially unwanted application, a PUP, a PUA, or junkware, is a type of program that is not strictly malicious, but may be unwanted for the user.

What Is A Technical Support Scam

What Is A Technical Support Scam?

Difficulty: Medium

A technical support scam, often abbreviated to a tech support scam, is a deceptive activity that uses intentional false positives to convince users that their computers have problems when they actually don't.

What Is A Brute-Force Attack

What Is A Brute-Force Attack?

Difficulty: Medium

A brute-force attack is a type of cyberattack where the attacker repeatedly submits large numbers of passwords in the hope of discovering the correct password.

What Is Ciphertext

What Is Ciphertext?

Difficulty: Medium

Ciphertext is text that has been scrambled into random numbers, letters, and symbols by a cipher in order to make it unreadable if intercepted by anyone.

What Is A CAPTCHA

What Is A CAPTCHA?

Difficulty: Medium

Stands for Completely Automated Public Turing Test To Tell Computers And Humans Apart. A CAPTCHA is a security feature designed to prevent spam or abuse from automated bots.

What Is A Browser Hijacker

What Is A Browser Hijacker?

Difficulty: Medium

A browser hijacker is a type of malware that changes a browser's settings, appearance, theme, or behaviour without the user's permission.

What Is A Botnet

What Is A Botnet?

Difficulty: Medium

A botnet is a network of hijacked computers infected with malware that are controlled by a single attacking party to carry out cyberattacks and other malicious activities, like bringing servers down by DDoS attacks.

What Is Catfishing

What Is Catfishing?

Difficulty: Medium

Catfishing is the process of setting up a fake online profile to deceive other people, most commonly on social networking sites and dating sites.

What Is A Logic Bomb

What Is A Logic Bomb?

Difficulty: Medium

A logic bomb is a piece of malicious code designed to carry out instructions when specific conditions are met. Logic bombs can be inserted into malware.

What Is Decryption

What Is Decryption?

Difficulty: Medium

Decryption is the process of converting encrypted information back into its original plaintext form. It is the opposite of encryption.

What Is Shoulder Surfing

What Is Shoulder Surfing?

Difficulty: Easy

Shoulder surfing is the practice of looking over someone's shoulder to steal their sensitive information, including passwords, card numbers, and PIN numbers.

What Is A Drive-By Download

What Is A Drive-By Download?

Difficulty: Medium

A drive-by download is a vulnerability which unknowingly downloads and installs things on a computer without the user's permission or knowledge.

What Is Malvertising

What Is Malvertising?

Difficulty: Medium

Malvertising is the use of online advertising to spread malware or other unwanted software. Malvertisements infect systems with malware by embedding malicious links or code into them.

What Is Pharming

What Is Pharming?

Difficulty: Medium

Pharming is the practice of redirecting a user to a fake website that mimics the appearance of a legitimate one to collect personal information, like usernames, passwords, and bank details.

What Is Social Engineering

What Is Social Engineering?

Difficulty: Medium

Social engineering is the use of deception tactics to get a user to give away their sensitive information, like usernames, passwords, and bank details, which may be used for fraudulent purposes.

What Is Rogue Security Software

What Is Rogue Security Software?

Difficulty: Medium

Rogue security software is a type of malware that tricks users into thinking they have viruses or malware on their computers when they actually don't and misleads them with fake detections and alerts.

What Is Scareware

What Is Scareware?

Difficulty: Medium

Scareware is a type of malware designed to scare users into downloading and installing unwanted and often malicious software that is of little to no use to them.

What Is Two-Factor Authentication

What Is Two-Factor Authentication?

Difficulty: Medium

Two-factor authentication (2FA), also known as two-step verification, or dual-factor authentication, is an electronic authentication method that requires two forms of verification before signing in.