Skip to content
David X Martin
Cyber Risk Management for business leaders
  • Home
  • Why Cybersecurity Matters
  • CyberWellness
  • Books
  • Articles & Media
  • Glossary
  • How I Help
  • About

Tag: cyberattack

Cybersecurity Glossary: Security threats

November 30, 2019 David X Martin

A security threat is a possibility of danger that might harm the vulnerability of a computer system and breach the security to cause damage.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, hack

Cybersecurity Glossary: Incident response plan

David X Martin

An incident response plan aims to reduce this damage and recover as quickly as possible. Investigation is also a key component in order to learn from the attack and better prepare for the future.

Continue Reading →

Posted in: Glossary Filed under: cyberattack

Cybersecurity Glossary: Intrusion Prevention System (IPS)

David X Martin

An intrusion prevention system (IPS) provides policies and rules for network traffic to alert a network administrator to suspicious traffic.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, hack

Cybersecurity Glossary: Hacker

November 21, 2019 David X Martin

A hacker is an unauthorized user who breaks into computer systems to steal, change or destroy information, often by installing dangerous malware without the knowledge or consent of the device’s rightful owner or user.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, data breach, hack

Cybersecurity Glossary: Forensics

David X Martin

The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, data breach, hack

Cybersecurity Glossary: Cyber Crime

November 12, 2019 David X Martin

Cyber crime occurs when a computer is the object of the crime or is used as a tool to commit an offense.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, data breach, hack, types of breaches

Cybersecurity Glossary: Denial of Service (DoS)

October 29, 2019 David X Martin

A Denial of Service (DoS) is a cyberattack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.

Continue Reading →

Posted in: Glossary Filed under: cyberattack

Cybersecurity Glossary: Ransomware

David X Martin

Ransomware is essentially digital extortion executed through software that uses encryption techniques to keep files — and entire systems — locked from use by their original owner, and holds them hostage.

Continue Reading →

Posted in: Glossary Filed under: cyberattack, data breach, hack

Cybersecurity Glossary: Malware

David X Martin

Malware (“malicious software”) is an umbrella term that describes any malicious program or code that is harmful to systems. Hostile, intrusive, and intentionally nasty, malware seeks to invade, damage, or disable computers

Continue Reading →

Posted in: Glossary Filed under: cyberattack

Cybersecurity Glossary: Cyber Attack

David X Martin

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks. Cybercriminals use methods including malware, botnets, PUPs, and phishing.

Continue Reading →

Posted in: Articles by DXM, Glossary Filed under: cyberattack, hack

Can I help?

Interested to learn more about How I Help?

- Advisor & Board Director
- Expert Witness
- Speaker & Author

Follow me on Twitter

My Tweets

Latest posts

  • Ransomware: Don’t Expect Governments Alone to Save Us
  • CyRM: Mastering the Management of Cybersecurity Risk, with David X Martin
  • The Future of Risk Management

Get in touch


Contact form

Let’s Connect

  • X
  • LinkedIn

NEW! CyRM: Mastering the Management of Cybersecurity

CyRM Mastering the management of cybersecurity by David X Martin

Introducing CyRM as an approach to growth

CyRM cyberWELlness

Search DavidXMartin.com

#cyberwellness
#cyrmbook
#cybersecurity
#riskmanagement
#cyberriskmanagement

LEARN THE LINGO
Cybersecurity Glossary

Privacy Policy

Your data is protected.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Copyright © David X Martin
Website by MediaMoxie.com