Darknets are an anonymous private file sharing networks between trusted peers using non-standard protocols. The anonymity means that there is little scope for authorities to intervene.
Content existing on Darknets that is only accessible by means of special software which allows users to remain anonymous or untraceable.
Encrypting databases will stop cyber criminals being able to read sensitive data even if they are able to access the database.
A large amount of data transferred from one system or location to another.
The deep web is the part of the internet which is not discoverable by means of standard search engines. It includes password protected or dynamic pages and encrypted networks.
Denial of Service (DoS) and Distributed Denial of Service (DDoS)
This is a type of cyber attack that prevents the use of system services or resources, or impairs access, usually by overloading the service with requests. This can occur with many types of businesses who process transactions online including e-commerce.
This is a type of brute force attack. Words, phrases and common passwords are used to gain access to your system.
An internet protocol to prevent spoofing
A technique to block known IP addresses.
A cyber criminal hijacks a domain by first blocking access to the domain’s DNS server and then putting his own server up in its place.
Domain Name Server (DNS)
DNS translates alphabetical website addresses into numerical IP addresses which identify the location of the website.
The length of time an attacker is present on an IT system without being detected.