Unauthorized access to or attack to a device, network, or system.
A type of security threat that tricks you into loading websites that can download malware onto your system.
The process of monitoring and recording activity on a computer system for later use in an investigation.
A type of malware that replicates itself in order to spread to other computers.
The process of converting information or data into a code to prevent unauthorized access.
A type of security assessment that identifies vulnerabilities in a system, network, or infrastructure.
A type of attack where an attacker disguises themselves as a trustworthy entity in an electronic communication.
A type of software designed to detect and destroy computer viruses.
A type of security threat that involves software that collects information about your computer activities and sends it over the internet without your knowledge.
Great job! Cyber criminals don't rest - so keep staying informed!