Quick Navigation

CYBERSECURITY#1

The practice of protecting systems, networks, and programs from digital attacks, ensuring data confidentiality and integrity.

NETWORK SECURITY#2

Measures taken to protect the integrity, confidentiality, and accessibility of computer networks and data.

VULNERABILITY#3

A weakness in a system that can be exploited by threats to gain unauthorized access or cause harm.

THREAT#4

Any potential danger that could exploit a vulnerability, causing harm to a system or network.

ANTIVIRUS SOFTWARE#5

Programs designed to detect and eliminate malware from computers, protecting against virus attacks.

VPN (VIRTUAL PRIVATE NETWORK)#6

A service that encrypts your internet connection, enhancing privacy and security while online.

PHISHING#7

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.

SAFE BROWSING#8

Practices that help users navigate the internet securely, avoiding malicious sites and protecting personal information.

PASSWORD MANAGEMENT#9

Techniques for creating, storing, and managing passwords securely to prevent unauthorized access.

ROUTER SECURITY#10

Settings and practices that secure a home router, preventing unauthorized access to the home network.

MALWARE#11

Malicious software designed to harm or exploit any programmable device, service, or network.

DATA ENCRYPTION#12

The process of converting information into a code to prevent unauthorized access.

FIREWALL#13

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

SMART DEVICE#14

Internet-connected devices that can collect and exchange data, often requiring specific security measures.

SECURITY TOOLS#15

Software or hardware designed to protect computers and networks from cyber threats.

SELF-ASSESSMENT#16

The process of evaluating one’s own security measures and vulnerabilities to identify areas for improvement.

DIGITAL PRIVACY#17

The right to control your personal information and how it is collected and used online.

INTRUSION DETECTION SYSTEM (IDS)#18

A device or software application that monitors network or system activities for malicious activities.

TWO-FACTOR AUTHENTICATION (2FA)#19

An extra layer of security requiring not just a password and username but also something that only the user has.

SECURE WEBSITES#20

Websites that use encryption to protect user data, typically indicated by 'https://' in the URL.

CYBERSECURITY BREACH#21

An incident where unauthorized access to data, applications, or networks occurs.

PERSONAL CYBERSECURITY PLAN#22

A tailored strategy outlining specific measures to protect personal devices and information.

RISK PRIORITIZATION#23

The process of evaluating and ranking risks based on their potential impact and likelihood.

ONLINE SAFETY TOOLS#24

Applications and extensions designed to enhance user safety while browsing the internet.

CROSS-SITE SCRIPTING (XSS)#25

A security vulnerability that allows attackers to inject malicious scripts into webpages viewed by users.