Bug Bounty Programs

A Bug Bounty Program is a deal that is offered by many websites, organizations, and software developers where individuals can receive recognition and monetary payment for reporting bugs or vulnerabilities …

spearphishing attack

Spear-Phishing

Spear-Phishing is a form of phishing attack that targets a specific person or organization, seeking access to sensitive information. Similar to phishing, this is done through spoofing emails that appear …

Whaling

Whaling refers to malicious hacking that targets high ranking executives. Similar to phishing, whaling is where the hacker hunts for data that they can use, but they focus on high-ranking …

Insider Threat 201

Malicious Code

Malicious Code, or sometimes known as “Attack Code” is a program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or …

How to Protect Yourself From Malware

Malware

Malware is software that compromises the operation of a system by performing an unauthorized function or process. Malware includes viruses, worms, and trojan horses. Synonyms: Antivirus, Malicious Code, Malicious Applet, …

Rootkit

A rootkit is a set of software tools with administrator-level access privileges installed on an information system and designed to hide the presence of the tools, maintain the access privileges, …

Spyware

Spyware is software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner. Related Term: Keylogger Source: CNSSI 4009, NIST SP …

How to Protect Yourself From Malware

Malicious Applet

A malicious applet is a small application program that is automatically downloaded and executed and that performs an unauthorized function on an information system. It is essentially malware that is deployed …

Malicious Logic

Malicious Logic is hardware, firmware, or software that is intentionally included or inserted in a system to perform an unauthorized function or process that will have adverse impact on the …

trojan horse cybersecurity breaches

Trojan Horse

A Trojan Horse is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting …

How to Protect Yourself From Malware

How to Protect Yourself From Malware

This short 3 min video outlines how to combat malware by preventing it from being installed in the first place.  It outlines how to keep computer security up-to-date with patching, …

Ransomware

Ransomware is a type of malicious software designed to block access to a computer system, and more importantly the critical data it contains, until a sum of money or ransom …