unauthorized access to a computer system or network to steal or manipulate data.
Phishing:
A form of social engineering where attackers impersonate a trustworthy entity to trick victims into giving away sensitive information.
Malware:
Malicious software designed to harm or exploit a computer system, including viruses, worms, and Trojans.
Cyberstalking:
Using the internet or other forms of technology to harass, intimidate, or threaten someone.
Identity theft:
Obtaining personal information to commit fraud or other crimes under someone else's identity.
Ransomware:
A type of malware that encrypts a victim's files and demands payment for their release.
Botnets:
A network of compromised computers that are used to carry out attacks or perform other malicious actions.
Denial of Service (DoS) attacks:
Overloading a computer system or network with traffic to make it unavailable to users.
Cyberbullying:
Using technology to harass, humiliate, or intimidate someone, especially a minor.
Online fraud:
Scamming individuals or businesses out of money through various online schemes.
Data breaches:
Unauthorized access to sensitive information stored on a computer system or network.