Cyber Warfare |
Cyber warfare typically refers to cyber-attacks perpetrated by one nation-state against another. |
Cyber Hygiene |
Cyber hygiene is a reference to the practices and steps that users of computers and other devices take to maintain system health and improve online security. |
Cyberbiosecurity |
Cyberbiosecurity is an emerging field at the intersection of cybersecurity and biosecurity. The objective of cyberbiosecurity has been described as addressing “the potential for or actual malicious destruction, misuse, or exploitation of valuable information, processes, and material at the interface of the life sciences and digital worlds”. Cyberbiosecurity is part of a system of measures that collectively aim to “Safeguard the Bioeconomy”. |
Cyber Attack |
An attack, via cyberspace, targeting an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information. |
CTF |
Capture the flag – is a team competition (sometimes personal) in the field of computer (information) security. |
Critical Update |
A fix for a specific problem that addresses a critical bug in computer software. |
Cookie |
Cookies are small files which are stored on a user’s computer. Cookies provide a way for the website to recognize you and keep track of your preferences. |
Cloud Computing |
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. |
Clickjacking |
Clickjacking, also known as a UI redress attack, is a common hacking technique in which an attacker creates an invisible page or an HTML element that overlays the legitimate page. |