Cyber Thesaurus - Vocabulary Pt.1

Cyber-security has its own intimidating jargon.  You’ll be better equipped to address your cyber risks when you know some of the the terminology.

DDoS. Distributed Denial of Service attacks are designed to knock a network offline. Usually, the attack takes advantage of multiple compromised systems to cause a system-wide shut-down. DDoS attacks are often used as decoys to distract system administrators from noticing other suspicious activity, like a data breach.

Phishing. One of the most common types of cyber-attacks. An email appears to come from a verified sender. When the recipient opens the email and clicks on a link or an attachment, malware gets to work capturing and exporting data. 
Phishing scams may also introduce a ransomware attack.

Ransomware. A software attack that either locks the targeted user from data or threatens to publish it unless a ransom is paid. Sophisticated ransomware attacks use a technique called crypto-viral extortion to encrypt data, making files virtually impossible to recover without a decryption key.

Whaling. A more sophisticated style of phishing, whaling attacks target senior management, such as CEOs or CFOs, who have administrative privileges and access to valuable data like company financial or personnel information.

Associations Now

You Might Also Read: 

The New Face of Cybersecurity:

 

« Russia Is Building A Separate Military Cloud
Facebook Admits Privacy Settings 'Bug' Affects 14 Million Users »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Foundation for Strategic Research (FRS)

Foundation for Strategic Research (FRS)

The Foundation for Strategic Research is France's main independent think tank on strategic, defense and security issues. Cyber security is covered as part of the study areas.

Venable

Venable

Venable is an American Lawyer 100 law firm with nine offices across the USA, Practice areas include Cybersecurity.

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

AuthenTrend

AuthenTrend

AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

NSEIT

NSEIT

NSEIT offers end-to-end Information Technology products, solutions and services including cybersecurity to organizations in the financial sector.

IPQualityScore (IPQS)

IPQualityScore (IPQS)

IPQS anti-fraud tools provide a real-time fraud score to analyze how likely a user or visitor is to engage in fraudulent behavior.

GulfTalent

GulfTalent

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Digital Element

Digital Element

Digital Element is a global IP geolocation and intelligence leader with unrivaled expertise in leveraging IP address insights to deliver new value to companies.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

Chainguard

Chainguard

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default.

Telit Cinterion

Telit Cinterion

Telit Cinterion is a global enabler of the intelligent edge providing highly secure IoT solutions, modules and services.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.