Social Engineering - ANSWER Manipulating people into performing actions
or divulging confidential information
Phishing - ANSWER Attempting to acquire sensitive info (usernames,
passwords, credit card info) by acting like a trustworthy source using bulk email
Cyberhesit - ANSWER Incident in which organized crime penetrates the
network of an organization and empties bank account via the internet
HIPAA - ANSWER Health Insurance Portability and Accountability Act
Utilities - ANSWER Apps designed to help analyze, configure, optimize or
maintain a computer
OS - ANSWER Operating System, software that manages the computer
hardware
Platform - ANSWER The environment in which a piece of software is
executed
Feature - ANSWER Characteristic of software/hardware
Plugin - ANSWER Component that adds specific feature to software
SAAS - ANSWER Software as a Service; a subscription service where you
purchase licenses for software that expire at a certain date.
API - ANSWER Application Programming Interface, set of defined methods
of communication between software
, Console - ANSWER Interface that manages and controls software
Dashboard - ANSWER At a glance views of key info relative to a business
objective
Server - ANSWER Computer that manages access to centralized resources
Protocol - ANSWER Specific set of communication rules between computers
Hypertest Transfer Protocol - ANSWER Protocols used to transfer info over
the internet
White Paper - ANSWER A report that describes how a tech or product solves
a problem
Whitelist - ANSWER A list of trusted websites you have allowed access to so
that searching or surfing the internet is safer.
Spear Phishing - ANSWER A phishing attack that targets only specific users.
Phishing Attack Surface - ANSWER Quantity of emails exposed on the
internet. More emails=bigger attack= higher risk
Phish Prone Percentage - ANSWER Percentage of employees that are prone to
click on phishing links
Vishing - ANSWER Phishing attacks committed using telephone calls or VoIP
systems.
Smishing - ANSWER Phishing attacks committed using text messages (SMS).
Email Spoofing - ANSWER Spoofing that occurs when the sender's address or
other components of an email header are altered so that it appears that the email
message originated from a different sender.
Trojan - ANSWER A program disguised as a harmless application that
actually produces harmful results.
or divulging confidential information
Phishing - ANSWER Attempting to acquire sensitive info (usernames,
passwords, credit card info) by acting like a trustworthy source using bulk email
Cyberhesit - ANSWER Incident in which organized crime penetrates the
network of an organization and empties bank account via the internet
HIPAA - ANSWER Health Insurance Portability and Accountability Act
Utilities - ANSWER Apps designed to help analyze, configure, optimize or
maintain a computer
OS - ANSWER Operating System, software that manages the computer
hardware
Platform - ANSWER The environment in which a piece of software is
executed
Feature - ANSWER Characteristic of software/hardware
Plugin - ANSWER Component that adds specific feature to software
SAAS - ANSWER Software as a Service; a subscription service where you
purchase licenses for software that expire at a certain date.
API - ANSWER Application Programming Interface, set of defined methods
of communication between software
, Console - ANSWER Interface that manages and controls software
Dashboard - ANSWER At a glance views of key info relative to a business
objective
Server - ANSWER Computer that manages access to centralized resources
Protocol - ANSWER Specific set of communication rules between computers
Hypertest Transfer Protocol - ANSWER Protocols used to transfer info over
the internet
White Paper - ANSWER A report that describes how a tech or product solves
a problem
Whitelist - ANSWER A list of trusted websites you have allowed access to so
that searching or surfing the internet is safer.
Spear Phishing - ANSWER A phishing attack that targets only specific users.
Phishing Attack Surface - ANSWER Quantity of emails exposed on the
internet. More emails=bigger attack= higher risk
Phish Prone Percentage - ANSWER Percentage of employees that are prone to
click on phishing links
Vishing - ANSWER Phishing attacks committed using telephone calls or VoIP
systems.
Smishing - ANSWER Phishing attacks committed using text messages (SMS).
Email Spoofing - ANSWER Spoofing that occurs when the sender's address or
other components of an email header are altered so that it appears that the email
message originated from a different sender.
Trojan - ANSWER A program disguised as a harmless application that
actually produces harmful results.