BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Cookies

Cookies are text files with small pieces of data from a website, used to identify your computer, that is stored within a web browser and can be retrieved by the website at a later time.

2023-07-06T08:13:51+01:00July 6th, 2023|

Critical National Infrastructure (CNI)

According to the National Proactive Security Authority, Critical National Infrastructure (CNI) is Those critical elements of infrastructure (namely assets, facilities, systems, networks or processes and the essential workers that operate and facilitate them), the loss or compromise of which could result in: a) Major detrimental impact on the availability, integrity or delivery of essential [...]

2023-07-05T15:14:35+01:00July 5th, 2023|

Crypto Ransomware

Among the oldest, and traditionally the most common form of ransomware, crypto ransomware works by finding valuable files on a system and applying encryption to them so they become unusable.

2022-09-23T21:50:29+01:00July 26th, 2022|

Cryptography

In cybersecurity, cryptography is the process of protecting sensitive information from unauthorized access during storage or transmission by rendering it unreadable without a key. This means that only those for whom it is intended can read and process it.

2023-03-07T16:35:40+00:00March 7th, 2023|

Cryptojacking

Cryptojacking is a type of cybercrime that involves a hacker co-opting a victim’s computing power to generate cryptocurrency on the attacker’s behalf. The motive for these types of attacks is profit, which is usually extremely effective as it is completely hidden from users and difficult to detect. Hackers use this method instead of having [...]

2022-09-23T21:50:42+01:00September 21st, 2022|

CTO

A Chief Technology officer (CTO) oversees the current physical and personnel technology infrastructure and creates relevant policies and procedures. The CTO will have business knowledge necessary to align technology related decisions with business goals.

2023-07-05T15:11:59+01:00July 5th, 2023|

Cyber incident

A cyber incident is a cybersecurity event that has compromised an organization's data or systems or that has bypassed the security measures put in place.

2023-03-08T15:36:36+00:00March 8th, 2023|

Cyberattack

A cyberattack is any attempt by cybercriminals to access a computer, computing system or computing network with the intent to steal, expose, alter, disable or destroy information.

2023-03-08T14:05:02+00:00March 8th, 2023|

Cyberespionage

Cyberespionage (preferred) or cyber espionage refers to malicious software used to extract trade secrets or sensitive confidential information from corporations or government for harm (financial, strategic, political) or profit.

2022-09-23T21:50:59+01:00July 19th, 2022|

Cybersecurity

Cybersecurity is the practise of protecting critical systems and sensitive information from cyberattacks through the application of technologies, processes and controls.

2023-03-08T15:38:26+00:00March 8th, 2023|

Title