BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Dark Web

The Dark Web is an anonymous network that can only be accessed by browsers such as Tor. By content alone it is larger than the standard indexable Web that we use everyday by about 50% and represents approximately 6% of all sites.

2022-09-23T21:51:20+01:00July 19th, 2022|

Data Breach

A security incident during which confidential data or sensitive information is stolen or taken from a system, without the knowledge or authorization of the system’s owners, by either malicious insiders or external attackers.

2023-03-08T14:02:40+00:00March 8th, 2023|

Data Exfiltration

Data exfiltration, data loss or data leakage is essentially the removal of information or data from an electronic device, typically a computer, mobile phone or other Internet connected device.

2022-09-23T21:51:38+01:00July 19th, 2022|

Data Loss Prevention (DLP)

Data Loss Prevention (DLP) are solutions and technologies that detect and prevent data breaches, exfiltration and unwanted data destruction. It does this by helping network admin and cybersecurity professionals to control which data users can transfer. As it blocks data exfiltration, organizations use it for internal security and regulatory compliance.

2023-03-07T16:08:56+00:00March 7th, 2023|

Decryption

Decryption is the process of converting data that was unreadable, due to encryption, back to its original format that is both readable and understood by either a human or a computer. To decrypt data, a key or password is usually required.

2023-03-07T16:37:03+00:00March 7th, 2023|

Deep Fake

Deepfake is a form of artificial intelligence (AI) that us used to accurately impersonate others in hoax images, sounds or videos. All the creator needs are images, videos and audio recordings of the individuals they wish to impersonate.

2023-07-05T15:04:21+01:00July 5th, 2023|

Denial of Service (DoS)

A Denial of Service (DoS) attack is an attack used to disable, shut down or disrupt a network, website, or service, making it inaccessible to its intended users. This is accomplished by flooding the target with traffic or sending it information that will trigger a crash, preventing legitimate users from using the service [...]

2023-03-07T16:43:41+00:00March 7th, 2023|

Dictionary Attack

A dictionary attack is a systematic, brute-force technique during which attackers will run common words and phrases, along with their simple variations, to guess passwords.

2023-03-08T15:43:29+00:00March 8th, 2023|

Distributed Denial of Service Attack (DDoS)

Distributed Denial of Service attacks are a type of cybercrime which uses numerous systems to perform an attack, aiming to exceed a website’s capacity to handle requests and therefore prevent the website from functioning properly for online users. The attacker will flood a server with internet traffic to prevent users from accessing online services, [...]

2022-09-23T21:52:04+01:00September 21st, 2022|

Title