notes
INTERNET VULNERABLE
🔽They can occur through flaws, features or user error, and attackers will look to exploit any of them, often combining one or more, to achieve their end goal.
🔽The internet is vulnerable due to weaknesses, known as vulnerabilities, in hardware, software, and user behavior that cybercriminals can exploit to steal data or disrupt services.
🔽 Common vulnerabilities include unpatched systems, misconfigured network devices like routers, and weak passwords.
HACKING
hacking is the act of exploiting vulnerabilities to gain unauthorized access to a computer system, network, or digital device for various purposes, including data theft, system disruption, or manipulation.
DATA THEFT
Data theft in cybersecurity is the unauthorized access and copying, transfer, or retention of sensitive personal, financial, or proprietary information from digital sources.
CYBER VANDALISM
Cyber vandalism is the intentional, unauthorized disruption, modification, or destruction of digital systems, data, or websites
CYBER FRAUD
Cyber fraud, or cybercrime, is the deceitful use of the internet or other digital technologies to illegally acquire money, personal information, or goods from individuals and organizationsdata
COOKIES
In cybersecurity, "cookies" refer to tiny data files websites store on your device to remember information like login details, preferences, and past activity. While cookies enhance user experience by personalizing visits, they pose significant cyber security risks including session hijacking, identity theft, and unauthorized access to sensitive data
Comments
Post a Comment