Key Concepts
- Malware: software intentionally designed to damage, exploit, or disrupt systems.
- Spoofing: pretending to be a trusted source to mislead victims.
- Botnet: a network of infected devices controlled by an attacker.
- Phishing: deceptive messages used to steal login data or financial information.
- DDoS Attack: overwhelming a target with traffic from many sources.
- Authentication: confirming that a user or system is really who it claims to be.
- Cyber Hygiene: safe digital habits such as updates, strong passwords, and cautious clicking.