We live in a world so connected to the Internet that the aspect of cybersecurity is vital to keep us alert and safe. That is why it is also really important to know some of the most famous terms.
Today, most people cannot imagine being without the Internet for even a single day. Therefore, everyone should ensure that they protect their Internet access with the appropriate cybersecurity measures.
And it is that, with an increasing number of devices and programs, combined with the exponential increase in data circulating, many of which are sensitive or confidential, the importance of cybersecurity continues to grow. Furthermore, the volume and sophistication of cyber attackers and attack techniques further exacerbate the problem.
We all seem to have more or less already clear about this. However, we often hear some words or concepts like “DDoS attack” or “ransomware” that we don’t know what they refer to. There are even some simple ones like “hacking” that we don’t know how to explain what they consist of.
That is why it is really important to know what they mean to know what to expect in case we are informed of a phishing or smishing attack, for example. We want to solve some doubts with this dictionary of 10 cybersecurity concepts you should know.
- malware and viruses
- Social Engineering Attack
- Phishing, Smishing, and Vishing
- DNS Spoofing
- botnet attacks
- DDoS (Denial of Service Attack)
- cryptocurrency hijacking
Hacking is the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data. Hacking is not always a malicious activity, but the term has mostly negative connotations due to its association with cybercrime .
malware and viruses
Malware, or malicious software, is a general term used to describe any program or code that is created with the intent to harm a computer, network, or server. A virus, on the other hand, is a type of malware. Its definition is limited only to programs or codes that self-replicate or copy themselves to spread to other devices or areas of the network.
Aside from the issue of self-replication, there are other important distinctions between malware and viruses. For example, and typically, malware attacks are initiated through phishing or social engineering techniques, as well as corrupted downloads or attachments.
Social Engineering Attack
Social engineering is currently a common tactic used by cybercriminals to collect sensitive information from users. Simply put, it is a manipulation technique.
Using a fake identity and various psychological tricks, hackers can trick you by showing attractive advertisements, prizes, and great offers, and asking you to enter your personal and bank details.
All the information you enter there is cloned and used for financial fraud, phishing, etc. Here we find some as well-known as Phishing, Smishing, and Vishing.
Phishing, Smishing, and Vishing
Phishing or identity theft is a fraudulent action that consists of sending unwanted emails pretending to be from a legitimate source .
These emails have a very attractive subject line with attachments such as an invoice, job offers, or websites like Amazon, for example. Phishing attacks are the most common cyber attacks that aim to steal sensitive data such as login credentials, credit card numbers, bank account information, etc.