Cybersecurity Glossary
A glossary of definitions for various terms and concepts that relate to the cybersecurity domain.
Definition | Description |
---|---|
Angler Phishing |
Angler phishing is a type of phishing attack where cybercriminals use fake social media profiles to find and compromise victims. |
Business Email Compromise |
Business Email Compromise (BEC) is a type of highly sophisticated email phishing attack where cybercriminals impersonate trusted individuals to try and mislead or manipulate a victim. |
Callback Phishing |
Callback phishing is a type of phishing attack where scammers entice victims to call a phone number and reveal sensitive information. |
Executive Phishing |
Executive phishing is a type of highly sophisticated email phishing attack where cybercriminals impersonate senior management or executives within a business to try and mislead or manipulate employees. |
Evil Twin Phishing |
Evil twin phishing is a type of phishing attack where scammers create fake WiFi networks that have the same SSID as legitimate WiFi networks to trick victims into connecting to them. |
Human Risk Management |
Human Risk Management (HRM) is about understanding how human behaviors, decisions, and actions can impact an organization's cybersecurity posture. |
Malvertising |
Malvertising is a type of phishing attack where cybercriminals use paid advertisements to distribute malware. |
Quishing |
Quishing is a type of phishing attack where scammers use QR codes to trick victims into opening malicious links or downloading malicious files. |
Smishing |
Smishing is a type of phishing attack where cybercriminals use SMS messages to distribute malware or impersonate trusted individuals to try and mislead or manipulate a victim. |
Vishing |
Vishing is a type of phishing attack where cybercriminals abuse the intimate nature of voice calls to try and manipulate a victim through coercion or manipulation. |