Some IT terms to know
1)Social Engineering—in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.
2)Dox/Doxxing—Doxing or doxxing is the Internet-based practice of researching and broadcasting private or identifying information about an individual or organization. The methods employed to acquire this information include searching publicly available databases and social media websites, hacking, and social engineering.
3)IoT (Internet of Things)—household and other non-computer-like devices that connect to the internet for data streaming or data dissemination (“Smart TVs”, bathroom scales, refrigerators (you’r low o milk), Washers and dryers, garage door openers, thermostats—NEST, doorbells (Ring) to name a few
4)CyberSecurity—catchy name for securing your information and devices. Such devices include phones, computers, tablets, household devices that use internet connectivity
5)AI—Artificial Intelligence—The ability to have a computer extrapolate a single answer and a best answer based on inout about the situation
6)Cloud computing and Cloud Storage—Put simply to simply means servers/storage/computers that are housed elsewhere. Not housed on-premises. Yahoo and gmail are examples of cloud services. But they weren’t called cloud service. It is a marketing term more than anything.
7)password spraying—is an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords. Traditional brute-force attacks attempt to gain unauthorized access to a single account by guessing the password.
8)password stuffing—the automated injection of breached username/password pairs in order to fraudulently gain access to user accounts.
8)phishing (spear, whaling)
9)MFA/2FA—Multi-Factor Authentication/ 2-factor Authentication—an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence. Two-factor authentication is a type, or subset, of multi-factor authentication
10)Hacker—Often interchangeably used with criminal in the news and common vernacular. A hacker is actually, anyone who tinkers and looks for efficiencies and ways to automate or improve a product. This includes looking for weaknesses and security holes in a product. Criminals take that information and use it to their benefit independent of harm to others.