Most Common Definitions (v.1)
Deceptive attempts to steal sensitive information like usernames, passwords, and credit card details.
Malicious software designed to harm, exploit, or disrupt computer systems, networks, or devices.
A type of malware that encrypts a victim's files and demands payment for their decryption.
Distributed Denial of Service attacks that overwhelm a network with traffic, causing a shutdown or service denial.
An attack that manipulates back-end databases through malicious SQL code.
Attacks targeting vulnerabilities in software before the developer has issued a fix or patch.
Risks posed by individuals within an organization who may misuse access to sensitive information.
Prolonged and targeted cyber attacks aiming to steal information or disrupt operations.
Unintended download of malicious code from a compromised website, leading to infection.
Attempts to steal or crack user passwords using various techniques like brute force or dictionary attacks.
Injecting malicious scripts into websites viewed by other users, often to steal data or credentials.
Malicious software disguised as legitimate software, often tricking users into downloading and installing it.
Unauthorized interception of private communication over digital networks.
Security risks that directly impact devices such as computers, smartphones, and tablets. These include malware infections, unauthorized access, data theft, and physical theft or damage to the devices themselves.
Unauthorized interception and alteration of communication between two parties. This type of attack often occurs in unsecured Wi-Fi networks, allowing the attacker to intercept and modify data transmitted between the victim's device and the network.
Definitions provided for documentation