Cybersecurity for beginners: 10 terms you should know | Cybersecurity Glossary

1K views
1 year ago

Find the full cybersecurity glossary here: https://nordvpn.com/cybersecurity/glossary/ Take the first steps in cybersecurity by protecting yourself šŸ” Get NordVPN: https://content.nordvpn.com/3XtvTCl *** Want to learn more about cybersecurity but not sure where to start? Check out the NordVPN cybersecurity glossary! From cybersecurity terms for beginners, to advanced definitions, find everything here: https://nordvpn.com/cybersecurity/glossary/ *** šŸ”” Subscribe to get the latest content: https://www.youtube.com/channel/UCSZhRxyloC-qzURiOa3vbFQ?sub_confirmation=1 *** 00:00 Intro 00:13 DNS query 00:42 Dark Web 00:55 Ethical hacking 01:19 Firewall 01:33 Email spoofing 02:06 RFID blocking 02:25 Trojan 02:41 Warchalking 03:12 Smishing 03:35 Adware *** Wanna be a cybersecurity expert, but youā€™re not sure where to start? Just like with learning a new language, vocabulary is key. So here are ten terms every cyber enthusiast should know! DNS query. A DNS query, also known as a DNS request, is a deviceā€™s request to a Domain Name System (DNS) server to provide an IP address for a given hostname. For example, when you enter a website into your browserā€™s search bar, like ā€œYouTube.comā€ on your computer, it will send a question to the DNS server about which network or IP address the domain name belongs to so it can direct you there. Dark Web The dark web is the part of the internet that consists of websites that hide their IP addresses from the rest of the internet. In order to access websites on the dark web, you will need specific software. Ethical hacking Ethical hacking, also known as white hat hacking or penetration testing, is a type of legal hacking and testing that aims to identify security vulnerabilities in networks, software, or hardware. Itā€™s performed by cybersecurity experts who always have the permission of the target to hack into systems and report vulnerabilities. Firewall A firewall is a security system that controls network traffic based on specified parameters. It provides network security by blocking some threats and preventing unauthorized access. Email spoofing Email spoofing is also known as an email spoofing attack or an email spoof. Itā€™s a type of cyberattack where the criminal fakes (spoofs) the sender address and poses as a person in a position of authority (like a bank or government representative) or an acquaintance of the victim. The attacker wants to lower the victimā€™s guard to then trick them into clicking a link to a malicious website or downloading an infected attachment. RFID blocking RFID stands for radio frequency identification. Credit cards and passports use RFID technology to allow machines to scan them from a short distance. RFID blocking means using special wallets, sleeves, passport covers, and other objects that limit RFID scanning. Trojan Also known as a trojan virus or a trojan horse, a trojan is a type of malware that masks itself as a legitimate program or file so it can get inside a computer and perform malicious actions. Warchalking Warchalking is the drawing of chalk symbols in public places to indicate free Wi-Fi hotspots. Wi-Fi enthusiasts practice warchalking in rural and urban areas and usually draw warchalking symbols on objects near the Wi-Fi hotspot, like sidewalks, walls, or lamp posts. However, the markings may advertise unintentionally open Wi-Fi networks, posing a security threat to those who may have accidentally left their network unsecured. Smishing Smishing is a cyberattack that is carried out over text messages. Smishing is a variant of phishing, where cybercriminals send out fake texts to convince their victim that itā€™s from someone they know or trust, like a bank or a government agency. Usually, the goal is to steal money or get the person to install malware on their device to enable further attacks. Adware Adware, or advertising-supported software, is software or an application that hijacks your browser and shows unwanted advertisements on your device. It is used to make money ā€” adware developers earn revenue for each advertisement a user sees. Adware isnā€™t considered as dangerous as a virus but can lead to security problems. *** About NordVPN NordVPN is the worldā€™s leading VPN provider and the flagship service of Nord Security. We aim to provide internet users with all the necessary online security tools. What is a VPN? VPN is short for virtual private network. Itā€™s a service that protects online activity and changes IP address and virtual location. *** Grab the Deal! šŸƒ https://content.nordvpn.com/3XtvTCl *** Check out NordVPNā€™s German and French channels to enjoy top-notch cybersecurity content in your native language! āÆļø šŸŒ šŸ‡«šŸ‡· @NordVPNenfrancais šŸ‡©šŸ‡Ŗ @NordVPNaufDeutsch *** #NordVPN #CybersecurityGlossary #CybersecurityForBeginners

0 Comments

0/2000