Spyware |
Spyware is a type of software that installs itself on a device and secretly monitors a victim’s online activity. |
Spear Phishing |
Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information. |
Spam |
Spam is slang commonly used to describe junk e-mail on the Internet. |
Software |
Software is the name given to the programs you will use to perform tasks with your computer. |
Social Engineering |
Social engineering is the art of manipulating people, so they disclose confidential information. |
Smishing |
Smishing is any kind of phishing that involves a text message. |
SIEM (Security Information and Event Management) |
A formal process by which the security of an organization is monitored and evaluated on a constant basis. |
Server |
A server is a computer program that provides a service to another computer programs (and its user). |
Security Operations Centre (SOC) |
A SOC monitors an organisation’s security operations to prevent, detect and respond to any potential threats. |
Security control |
Anything used as part of a security response strategy which addresses a threat in order to reduce risk. (Also known as countermeasure or safeguard.) |
Security Awareness Training |
Security awareness training is a training program aimed at heightening security awareness within an organisation. |
Scareware |
Scareware is a type of malware designed to trick victims into purchasing and downloading potentially dangerous software. |
Scam |
A scam is a term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person. |