BACK


 

Cyberattack

The malicious attempt to destroy or steal sensitive information through digital hacking

 

Informational Ransom

The threat of publicizing stolen sensitive information for a demanded price

 

Threat Analysis

The process of identifying the most pressing issues in a company’s I.T. security protocols

 

Viruses

The general term for programs with malicious intent. They may cause damage through data theft, software corruption, or other methods

 

Leave a Reply

Your email address will not be published. Required fields are marked *