Here you will find explanations to the most common terms in the Cyber Security world.
Click on the word to go to a full description, or on the icons to check the mind-map, videos or stories directly.
|wdt_ID||Word||Short description||Video||Mind Map||Cyber Story|
|1||Wi-fi Sniffing||Sniffing is a process of intercepting data packages on a given network. Whatever interaction that you take on a device that requires a network it will send data trough it. This data can be intercepted and analyzed by a sniffer.|
|2||Bruteforce attack||A Bruteforce attack is when the attacker will try a set of combinations to try to get into an account. Let’s say that the key is a shape. Then the attacker will try all existing geometrical shapes until it opens.|
|3||DDoS Attack||DDoS stands for Distributed Denial of Service (DDoS) attack, and it’s when someone will try to make a website unavailable.|
|4||Doxxing||It’s publicly exposing someone’s real name, address with a combination of other personal data on the Internet. This without the consent of that person.|
|5||Keylogger||A keylogger is a software or hardware that will spy and log every single keystroke of your keyboard. Keyloggers can be used by criminals to steal passwords and other sensitive materials.|
|6||Phishing||Phishing is an email attack that contains links to a fake login panel. The bogus website will ask you to login with username and password. IF you login the username and password will go directly to the attacker.|
|7||Shoulder-surfing||Shoulder surfing is a person close to you that will look into your screen to read when you input your password, pin code, or other valuable information.|
|8||Social Engineering||Social engineering is a combination of psychological and physical techniques that have as ultimate goal stealing information or assets.|
|9||Smishing||Smishing is a phishing assault that involves a text message.
It's a form of attack that will try to trick you into giving certain information like a security code or password.
|10||Account takeover||Account takeover is when fraudster will obtain your credentials to control your online account.|