Here you will find explanations to the most common terms in the Cyber Security world.
Click on the word to go to a full description, or on the icons to check the mind-map, videos or stories directly.
Cyber Glossary
wdt_ID | Word | Short description | Video | Mind Map | Cyber Story |
---|---|---|---|---|---|
1 | Wi-fi Sniffing | Sniffing is a process of intercepting data packages on a given network. Whatever interaction that you take on a device that requires a network it will send data trough it. This data can be intercepted and analyzed by a sniffer. | ![]() |
||
2 | Bruteforce attack | A Bruteforce attack is when the attacker will try a set of combinations to try to get into an account. Let’s say that the key is a shape. Then the attacker will try all existing geometrical shapes until it opens. | ![]() |
![]() |
|
3 | DDoS Attack | DDoS stands for Distributed Denial of Service (DDoS) attack, and it’s when someone will try to make a website unavailable. | ![]() |
![]() |
|
4 | Doxxing | It’s publicly exposing someone’s real name, address with a combination of other personal data on the Internet. This without the consent of that person. | ![]() |
||
5 | Keylogger | A keylogger is a software or hardware that will spy and log every single keystroke of your keyboard. Keyloggers can be used by criminals to steal passwords and other sensitive materials. | |||
6 | Phishing | Phishing is an email attack that contains links to a fake login panel. The bogus website will ask you to login with username and password. IF you login the username and password will go directly to the attacker. | |||
7 | Shoulder-surfing | Shoulder surfing is a person close to you that will look into your screen to read when you input your password, pin code, or other valuable information. | |||
8 | Social Engineering | Social engineering is a combination of psychological and physical techniques that have as ultimate goal stealing information or assets. | |||
9 | Smishing | Smishing is a phishing assault that involves a text message. It's a form of attack that will try to trick you into giving certain information like a security code or password. |
|||
10 | Account takeover | Account takeover is when fraudster will obtain your credentials to control your online account. | |||
Word | Short description |