Cybersecurity Research Project

Malware, Spoofing, and Botnets in Modern Cyber Threats

Key Concepts

  1. Malware: software intentionally designed to damage, exploit, or disrupt systems.
  2. Spoofing: pretending to be a trusted source to mislead victims.
  3. Botnet: a network of infected devices controlled by an attacker.
  4. Phishing: deceptive messages used to steal login data or financial information.
  5. DDoS Attack: overwhelming a target with traffic from many sources.
  6. Authentication: confirming that a user or system is really who it claims to be.
  7. Cyber Hygiene: safe digital habits such as updates, strong passwords, and cautious clicking.

Concept Relationship Table

Concept Connects To Importance
Phishing Spoofing Often the first step in stealing data
Malware Botnets Can infect devices and turn them into bots
Authentication Spoofing defense Helps confirm identity and reduce fraud