A short description is provided below with more detailed available by clicking of the definition name. This will take you to sites that have a more detailed description of the term.
Domain: A web or email domain is the unique name or address of a website on the internet, like “cybersafecenter.com.” It’s what we type into our browser to access a specific website (https://www.cybersafecenter.com) or as part of an email name (somebody@gmail.com).
Encryption: The process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key can unscramble it.
Hacker: Someone who can circumvent, modify, or take advantage of technology to manipulate, gain access, corrupt, steal, or destroy software, devices, phones, computers, or other types of technology.
IoT (Internet of Things): Physical objects, or “things,” that can connect over a network or to the internet. IoT devices can be phones, printers, computers, smart TVs, smart thermostats, newer model vehicles, baby monitors, smart watches, and anything that can “talk to the internet”.
Malware: Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Multi-factor authentication: Requires users to provide two or more ways to gain access to an account or system.
Pig butchering: These scams involve fraudsters gaining the trust of victims, oftentimes through a fictitious romantic relationship, and convincing the victim into giving money for fake cryptocurrency projects, the fake purchase of real estate, or money for travel.
Phishing: A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. There’s also ‘vishing’ (voice phishing), ‘smishing’ (SMS Phishing), spear phishing (targets specific individuals or groups within an organization), and whaling (targets high-profile individuals like CEOs).
Vulnerability: A weakness in a system or its security procedures that can be exploited by a criminal to gain unauthorized access or cause harm.