Are You familiar with these Terminologies used for Awareness of Cyber Security Exercise?
Are You familiar with these Terminologies used for Awareness of Cyber Security Exercise?
Please Familiarize Yourselves with Following Terminologies
Chargeback.
A payment card transaction where the supplier initially receives payment but the transaction is later rejected by the cardholder or the card issuing company. The supplier’s account is then debited with the disputed amount.
Cloud computing .
Delivery of storage or computing services from remote servers online (ie via the internet).
Encryption .
The transformation of data to hide its information content.
Firewall.
Firewall is Hardware or software designed to prevent unauthorised access to a computer or network from another computer or network.
Botnet.
A botnet is a network of devices infected by an attacker, and then used together to perform tasks such as carrying out DDoS attacks , mining Bitcoins, and spreading spam emails.
Data Breach.
A data breach happens when a company’s network is attacked and valuable data is stolen—usually customer log-in credentials, credit card details, and social security numbers.
DNS attack.
DNS stands for “domain name server,” which uses the name of a any common website to redirect traffic to its own IP address.
DDoS Attack.
Attackers use DDoS (Distributed Denial of Service) attacks to render a network unavailable. They do this by overwhelming the targeted machine with massive requests from multiple devices.
Mobile banking Trojans.
It looks like your trusted banking app, but that’s just an overlay. Underneath, a mobile banking Trojan tricks you into entering financial credentials and personal information. It can also gain administrative rights to intercept SMS messages, making it possible to record two-factor authentication codes as well.
Open Wi-Fi.
Open Wi-Fi networks are unencrypted, which is why they’re risky. Anyone can create a fake hotspot and trick your device into joining it automatically. When you use open Wi-Fi without protection like a VPN , anyone on that network can see the sites you visit, your log-in passwords, your financial and personal data, and more.
******************HAVE A NICE DAY********************
Post a Comment