Phishing

An attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from…

Passwords

A collection of characters for user authentication to secure access.

Network forensics

Involves monitoring and analysing packets of data in a network to identify where data is going.

Malware

Software that is designed to cause harm or damage to a computer. This includes viruses that might damage files, adware…

Firewall

An application or piece of hardware that prevents unauthorised connections to and from the Internet.

DOS attack

Stands for Denial of Service.  An attack designed to render online services inaccessible. One type of this attack involves many…

DDOS attack

Stands for Distributed Denial of Service.  An attack designed to render online services inaccessible. One type of this attack involves…