Restoring systems after damage/failure
Malware disguised as legitimate software
Network of infected devices controlled by hackers
Malware that infects and spreads by replicating
Facility to monitor and defend against cyber threats
A digital form of currency that uses cryptography to secure its transactions
The right to keep personal information confidential
Irrelevant or unsolicited bulk messages
The process of verifying the identity of a user.
Meeting laws, regulations and standards
Property of data being accessible when needed
Creating fake URLs that look real to access accounts
Criminal activity involving computers/internet
Process of encoding data to prevent unauthorized access
Secret sequence of characters for authentication
Creating a false identity online to trick someone
Program that tracks keystrokes
Malware that encrypts data until ransom is paid
Network security device that controls incoming and outgoing traffic
Network of compromised devices controlled by attackers
Illegal access of a computer system
Data to understand and respond to cyber threats
Process of dealing with a cyber attack