Security Best Practice Key Terms
BACK Cyberattack The malicious attempt to destroy or steal sensitive information through digital hacking Informational Ransom The threat of publicizing stolen sensitive information for a demanded price Threat Analysis The process of identifying the most pressing issues in a company's I.T. security protocols Viruses The general term for programs with malicious intent. They may cause damage through data theft, software corruption, or other methods