Glossary


Dark Web

A portion of the internet that is not indexed by search engines and requires specific software or authorization to access. It is often associated with illegal and illicit activities.


Data Breach

An incident in which sensitive, confidential, or protected information is accessed, stolen, or disclosed without authorization.


Data Leak

The unintentional exposure or disclosure of sensitive or confidential information, often due to a security vulnerability or human error.


Encryption

A method of securing digital data by converting it into a code to prevent unauthorized access.


Firewall

A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.


Identity Theft

A crime in which an individual's personal information is stolen and used for fraudulent purposes, such as making unauthorized purchases or opening fake accounts.


Phishing

A type of cyberattack in which fraudulent emails, messages, or phone calls are used to trick individuals into revealing sensitive information or installing malware


Two-Factor Authentication 2FA

An additional security layer that requires users to provide two forms of verification, such as a password and a code sent to their mobile device, to access an account.