Cybersecurity Terms Explained

Profile photo for Tim Chambers
Not Yet Rated
0:00
Elearning
9
0

Description

This is a short demo, explaining some common terms used in Cybersecurity. Please get in touch if you would like any further voiceover work, regarding any area of Information of Digital Technology.

Vocal Characteristics

Language

English

Voice Age

Young Adult (18-35)

Accents

British (General) British (Received Pronunciation - RP, BBC)

Transcript

Note: Transcripts are generated using speech recognition software and may contain errors.
Hello. Welcome to the first of hopefully many cybersecurity podcasts in which we will break down cyber security to make it easy to understand. Until you're all able to have some self protection of your digital footprint, the first topic we will address is some of the words we use. I will explain these words to make these topics easy to understand fishing. This is a tactic used by what we call adversaries, which is anyone who is aiming to attack the business. This is often like traditional fishing. The attacker will create bait, which may be an urgent email, something telling you you need to update your password or even sending you something that seems like an attractive proposition. These are all examples of bait. And when you fall for this email, usually by clicking a link they send you, the attacker will begin to reel you in and collect their catch, which in this case, maybe your username and password company information, sensitive financial data or even the personal information of our employees exploits. We use the term exploit to mean any tool technique or a tactic that an attacker can use to exploit the business. This can range from a technical exploit, such as traditional hacking to something like a social exploit, such as fishing for information. By speaking to you on the phone, pretending to be a vendor or client fireball. A fireball is like a wall around your castle. And make sure that your network traffic can go to websites and bad network traffic cannot get in. Quite often. You will hear members of the team talk about the fireball, so just think of it as the walls of the castle, protecting what is inside ransomware. This is a type of malicious software which locks down the computer by using encryption to block access to all your files. After the software has done this, what will be asked to pay a ransom fee to recover our files? The ransom is often paid in the Cryptocurrency more narrow in order to be untraceable. Sometimes Attackers may even release your confidential data if you do not pay, which can lead to fines from regulatory bodies. So this is a big risk