Explore tens of thousands of sets crafted by our community.
Cybersecurity Basics
15
Flashcards
0/15
Virtual Private Network (VPN)
A VPN extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. It helps secure digital media consumption and protect user privacy.
Advanced Persistent Threat (APT)
An APT is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period. Digital media organizations may be targeted to access confidential data or to gain control over media dissemination channels.
Secure Sockets Layer (SSL)
SSL is a standard security technology for establishing an encrypted link between a server and a client—typically a web server and a browser; or a mail server and a mail client. In digital media, SSL encryption is vital for secure data transfer and maintaining user trust.
Malware
Malware refers to malicious software designed to harm or exploit any programmable device or network. It can spread through digital media content like downloads, email attachments, and malicious ads.
Botnet
A botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, often to send spam or participate in a Denial-of-Service attack. Botnets can target digital media platforms to proliferate malware or disrupt services.
Zero-Day Exploit
A zero-day exploit is a cyber attack that occurs on the same day a weakness is discovered in software, before the software developer has a chance to create a patch to fix the vulnerability. Digital media platforms must quickly respond to such exploits to protect user data and maintain service continuity.
Ransomware
Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. Digital media assets and databases can be vulnerable to these attacks, leading to significant downtime and data loss.
Phishing
Phishing is a type of cyber attack where attackers masquerade as a trustworthy entity to steal sensitive data, often via email. It is relevant to digital media as it can target users of social media, online platforms, and email services.
Two-factor Authentication (2FA)
2FA is an extra layer of security used to ensure that people trying to gain access to an online account are who they say they are. It's increasingly used in digital media platforms to protect user accounts.
Man-in-the-Middle Attack (MitM)
In cybersecurity, a Man-in-the-Middle attack is when an attacker secretly intercepts and possibly alters the communication between two parties who believe they are communicating directly with each other. This is relevant in digital media to secure communication channels likemessaging and emailing.
Encryption
Encryption is the process of converting information or data into a code, especially to prevent unauthorized access. In digital media, it protects the privacy of communications and stored data.
Identity Theft
Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits. Digital media users can be susceptible to this if their personal information is compromised online.
Firewall
A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. In the context of digital media, it protects the integrity of data traffic related to media services.
Denial-of-Service Attack (DoS)
A Denial-of-Service attack is an attempt to make a machine or network resource unavailable to its intended users, typically by temporarily interrupting or suspending its services. Digital media companies are often targets of DoS attacks aiming to disrupt their services.
Social Engineering
Social engineering is the art of manipulating people so they give up confidential information. Attackers can use this technique to gain access to digital media accounts or trick individuals into divulging sensitive information.
© Hypatia.Tech. 2024 All rights reserved.