A security threat is a possibility of danger that might harm the vulnerability of a computer system and breach the security to cause damage.
An incident response plan aims to reduce this damage and recover as quickly as possible. Investigation is also a key component in order to learn from the attack and better prepare for the future.
An intrusion prevention system (IPS) provides policies and rules for network traffic to alert a network administrator to suspicious traffic.
A hacker is an unauthorized user who breaks into computer systems to steal, change or destroy information, often by installing dangerous malware without the knowledge or consent of the device’s rightful owner or user.
The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.
Cyber crime occurs when a computer is the object of the crime or is used as a tool to commit an offense.
A Denial of Service (DoS) is a cyberattack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.
Ransomware is essentially digital extortion executed through software that uses encryption techniques to keep files — and entire systems — locked from use by their original owner, and holds them hostage.
Malware (“malicious software”) is an umbrella term that describes any malicious program or code that is harmful to systems. Hostile, intrusive, and intentionally nasty, malware seeks to invade, damage, or disable computers
A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks. Cybercriminals use methods including malware, botnets, PUPs, and phishing.