1 of 8

Common words and phrases used in cybersecurity

2 of 8

Networks

This is the physical system that ensures internet access and can include: routers, hubs, cables and technical control devices.

3 of 8

Data Breach

The exposure of proprietary, sensitive, or classified information through data theft.

4 of 8

Identity Theft

A crime in which someone has wrongfully obtained and used another person's personal data usually for financial gain.

5 of 8

Malware

This is short for malicious code and refers to software that performs an unauthorized process that will have an adverse effect on the confidentiality or availability of an information system.

6 of 8

Ransomware

This is an attack usually aimed at individuals and it is a software that is designed to block access to a computer system until a sum of money is paid.

7 of 8

Phishing

This is a common scam in which an individual will try to trick you into acquiring sensitive personal information through a fraudulent email or website solicitation that is masquerading as legitimate.

8 of 8

Trojan Horse

A seemingly useful program that when used enacts a hidden malicious function that evades the systems security functions.