Cybersecurity Dictionary: everything you need to know about cyberattacks, viruses, malware, phishing and more

After the leak of data without authorization from customers of Interbank occurred last Wednesday, there has been talk on social networks about a cyber attack, malware, hacker, passwords and a series of terms related to cybersecurity.

This word refers to the practice that protects computer systems, Internet servers, smartphones or mobile devices, social networks, etc., against malicious attacks.

It can also be known as computer security or information technology security, Kaspersky notes on its website. These measures allow us to take care of the information of a person or organization.

But violation constitutes a crime. In Peru we talk about cybercrime, within the framework of the Computer Crimes Law (Law No. 30171), which sanctions illicit conduct that affects computer systems and data through the improper use of information or communication technologies.

Now, there are a number of terms that are often used. Regarding threats, the computer security company Kaspersky indicates that there are three types of threats:

First, cybercrime includes individual actors or groups attacking systems for financial gain or causing disruption. Then, you have cyberattacks that involve the collection of information for political purposes. Finally, cyberterrorism is also counted, the objective of which is to weaken electronic systems to cause panic or fear.

Attack methods

In any of these cases, cybercriminals act by following some methods:

1) Malware: malicious software used to attack a computer system. This software can be downloaded to an email or shared file, etc. Kaspersky points out that the types of malware include the following:

– Virus: a program capable of reproducing itself, which embeds itself in a clean file and spreads throughout the computer system and infects the files with malicious code.

– Trojans: a type of malware that disguises itself as legitimate software. Cybercriminals trick users into uploading Trojans to their computers, where they cause damage or collect data.

– Spyware: a program that secretly records what a user does so that cybercriminals can use this information.

– Ransomware: malware that locks a user’s files and data, with the threat of deleting them, unless a ransom is paid.

– Adware: advertising software that can be used to spread malware.

– Botnets: malware-infected computer networks used for online tasks without the user’s permission.

-Emotet: a type of Trojan that takes advantage of unsophisticated passwords. He was warned in 2019.

Nowadays, with the development of artificial intelligence, it is necessary to know more about cybersecurity. (Photo: pixabay.com)

2) SQL code injection: This method is used to take control and steal data from a database. What they do is insert malicious code into a database using an SQL (Structured Query Language) statement.

3) Phishing: This attack usually uses emails that pretend to be from a real company. That is how it requests personal or credit card information.

4) Ataque de tipo “Man-in-the-middle”: The attacker intercepts the communication between two subjects to steal data. You can use some Wi_Fi network that is not secure.

5) Denial of service attack: What is done is to overload a network or a service of some organization until it becomes unusable.

LOOK: Ai-Da is a humanoid robot artist and her painting will be auctioned for more than US$120 thousand

Other terms to know

1) Antispyware: tools that help protect a computer against unwanted, very stealthy software that is installed to spy on and obtain personal information from its victims.

2) Antivirus: is protection software that prevents the execution of malicious software on computer equipment and systems. Their job is to constantly analyze data within a team.

3) Captcha: It is a function to verify if a user is human or a bot (computer program), when you want to access an account. It may require identification of an image or text.

4) Password: security system by using a secret or personal code, by combining letters and numbers. Experts recommend that they be long and include capital letters, lowercase letters, numbers and special characters.

5) Hacker: It is the expert person, with knowledge in computing and who has the skills to violate systems or devices. It can have a positive or negative connotation depending on the actions you take.

6) Social engineering: It is the method that cybercriminals use to deceive users. It may include impersonation, persuasion, use of trust and other psychological methods to achieve the goal.

By Editor

One thought on “Cybersecurity Dictionary: everything you need to know about cyberattacks, viruses, malware, phishing and more”
  1. Group Health Insurance Dallas TX Faces Uncertainty Amid Healthcare Reforms – Columbus – WRDP
    Cocktail Party in Washington, DC Becomes a Staple of Corporate Culture – NEWSnet Sioux Falls- K06QJ
    Stock Market
    Culture – Buzzing Asia
    markets.financialcontent.com/clarkebroadcasting.mycentraloregon/news/article/marketersmedia-2024-10-10-party-entertainment-in-washington-dc-sees-shift-to-immersive-experiences
    Lewisville Health Insurance Tackles Barriers to Health Care for Black Women
    Group Health Insurance Dallas TX Faces Uncertainty Amid Healthcare Reforms – NEWSnet – News… at it used to be
    Austin Health Insurance for the Self-Employed Expands with New Medicare Handbook – 24/7 Sports News and Highlights Channel
    Frontal Report – World News, Commentary & Analysis
    Sports – Buzzing Asia
    Sports – Surat Khabar
    Party Entertainment in Washington, DC Sees Shift to Immersive Experiences – SOUTHEAST – NEWS CHANNEL NEBRASKA
    Dallas Small Business Health Insurance Faces Risks Amid Potential Policy Changes –
    Austin Health Insurance for the Self-Employed Expands with New Medicare Handbook – NEWSnet Sacramento
    What are several of the most popular spring festivals across the globe? | Women's Entrepreneur Network Business Listings
    In The Headline – Exclusive, Impactive Journalism
    Stock Market | User | thepilotnews.com
    Stock Market | About Us – The San Diego Union-Tribune
    markets.financialcontent.com/concordmonitor/news/article/marketersmedia-2024-10-4-lewisville-health-insurance-expands-access-to-care-for-black-women
    503 Service Temporarily Unavailable
    podcastaddict.com/episode/https%3A%2F%2Faudioboom.com%2Fposts%2F8587010.mp3%3Fmodified%3D1728449451%26sid%3D5124228%26source%3Drss&podcastId=4836436
    Dallas Health Insurance Joins Value-Based Medicare Advantage Plans Expansion – WWZW
    Massimizza il Tuo ROI: Il Ruolo Chiave del Consulente Facebook Ads
    Party Entertainment in Washington, DC Sees Shift to Immersive Experiences – RIVER COUNTRY – NEWS CHANNEL NEBRASKA
    Emporium Post – Daily Retailer & Wholesaler News
    Technology – In The Headline
    Cocktail Party in Washington, DC Becomes a Staple of Corporate Culture – Austin, TX
    Money – Buzzing Asia
    Stock Market | News | decaturdailydemocrat.com
    travelleisuremag.com/news/health-insurance-lewisville-faces-major-impact-from-upcoming-us-election-changes/489820

Leave a Reply