Malware (malicious software) is any program or file designed to harm a computer system, such as viruses, worms, trojans, spyware, and ransomware.
Phishing is a method where attackers send fake emails or messages to trick people into revealing personal information like passwords or bank details.
A DoS attack floods a network or server with traffic to overwhelm it, making it unavailable to users.
It’s an attack that repeatedly tries different passwords or PINs until the correct one is found, often using automated software.
Social engineering is manipulating people into giving up confidential information, often by pretending to be someone trustworthy.
A firewall blocks unauthorized access to a network while allowing outward communication, acting as a filter for incoming and outgoing traffic.
Encryption converts data into a coded format that only authorized users can understand, protecting it from hackers.
It's a method of testing a network’s security by simulating an attack to find vulnerabilities.
Software designed to detect, prevent, and remove malware from a computer system.
Network forensics involves monitoring and analyzing computer network traffic to detect and investigate security breaches.
A virus is a type of malware that attaches itself to files or programs and spreads when the infected file is opened or run.
Spyware secretly monitors user activity, often recording keystrokes to steal information like passwords or credit card numbers.
A Trojan appears to be a legitimate program but contains malicious code that can damage data or give hackers access to the system.
Ransomware locks or encrypts a user’s data and demands payment to restore access.
Adware is software that displays unwanted ads and can sometimes track user behavior for targeted marketing.
A worm is a standalone malware that can spread itself across networks without needing to attach to a file or program.
Authentication is the process of verifying the identity of a user, usually through passwords, PINs, or biometrics.
Packet sniffing is monitoring and capturing data packets on a network—can be used legally or maliciously.
A network protocol is a set of rules that define how data is transmitted and received over a network.
HTTPS encrypts communication between a user’s browser and a website, ensuring data privacy and integrity.
A protocol is a set of rules that determines how data is transmitted and received across a network.
HTTP (Hypertext Transfer Protocol) is used to transfer web pages from a server to a client (browser).
HTTPS (HTTP Secure) encrypts the data sent between the server and the client, making it secure against hackers.
FTP (File Transfer Protocol) is used to transfer files between computers over a network.
SMTP (Simple Mail Transfer Protocol) is used to send emails from a client to a mail server or between mail servers.
IMAP (Internet Message Access Protocol) is used to manage and access emails on a mail server without deleting them, allowing syncing across devices.
TCP (Transmission Control Protocol) ensures data is sent and received accurately and in the correct order.
IP (Internet Protocol) is responsible for addressing and routing packets of data so they reach the correct destination.
The TCP/IP stack is a set of protocols that work together to send and receive data over the internet reliably and efficiently.
DNS (Domain Name System) translates website names (like google.com) into IP addresses that computers use to locate each other.
A MAC (Media Access Control) address is a unique identifier assigned to network devices, used for local communication.
Different protocols are designed for specific tasks (e.g., sending emails, browsing web pages), helping networks run efficiently and securely.
Phishing. Train staff to spot suspicious emails and use email filters and anti-phishing software.
Risk of malware. Prevent this by installing anti-malware software and blocking pop-ups in browser settings.
Use access levels and permissions to restrict who can view or edit sensitive files.