Everything you need to know to understand CyberLite Issue 13. Read the issue here.
Cloud Computing: the practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.
Ransomware: Ransomware blocks access to a computer system until a sum of money is paid. It does this by encrypting all of the victim’s files. It’s increasingly common for criminals to now threaten to leak the files they’ve encrypted online to further encourage victims to pay the ransom.
Phishing: Phishing is a method of trying to gather personal information using deceptive e-mails and websites.
Bug Bounty: A reward offered to a person who identifies an error or vulnerability in a computer program or system.
Virtual Machine: A virtual machine is a software that behaves like an actual computer. It can be thought of as a computer created within a computer. One physical computer system can be used to run multiple virtual machines. Each virtual machine runs its own operating system and functions separately from the other virtual machines, even when they are all running on the same physical computer system.