Malware: Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system
Phishing: a malicious individual or group of individuals who scam users. They do so by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information
Vishing: When a Hacker calls you and tries to con you into surrendering confidential Information.
S-mishing: SMS phishing occurs thru text messages.
USB Attack: A hacker leaves a USB stick laying around for someone who is curious to plug it into a computer
Ransomware: form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid. Ransomware often infiltrates a PC as a computer worm or Trojan horse that takes advantage of open security vulnerabilities
DVR: Digital Video Recorded
NVR: Network Video Recorder
Wi-Fi : A facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area
Spear Phishing: Spear phishing is an email or electronic communications scam targeted towards a specific individual, organization or business
Drive by Download: A drive-by download refers to the unintentional download of malicious code to your computer or mobile device that leaves you open to a cyberattack. You don't have to click on anything, press download, or open a malicious email attachment to become infected. A drive-by download can take advantage of an app, operating system, or web browser that contains security flaws due to unsuccessful updates or lack of updates. Unlike many other types of cyberattack, a drive-by doesn't rely on the user to do anything to actively enable the attack.
PII: Personally identifiable information (PII) is any data that could potentially identify a specific individual. Any information that can be used to distinguish one person from another and can be used for de-anonymizing (data mining) anonymous data can be considered PII
Spoof: imitate (something)
Dark Web: the part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.
Trusted Platform Module V2 (TMP): This technology is designed to provide hardware-based, security-related functions. The most common TPM functions are used for system integrity measurements and for key creation and use. During the boot process of a system, the boot code that is loaded (including firmware and the operating system components) can be measured and recorded in the TPM. For a more detailed Feature description please go to TMP Overview or go to Microsoft Windows 11 Specifications.
Motherboard: The motherboard is the backbone that ties the computer's components together at one spot and allows them to talk to each other. Without it, none of the computer pieces, such as the CPU, GPU, or hard drive, could interact.