7. Glossary
Phishing
The aim of this scam is to deceive an Internet user by pretending to be a trusted third party, either by creating a fake site, usurping a brand or domain name, or imitating an e-mail address. It can also involve breaking into a system by using a corrupted link to create a fake site or e-mail.
Hacker – Hacker
An individual or informal organization seeking to illegally enter a system for direct or indirect personal gain.
Cyber intrusion
This is the act of breaking into a system and accessing the data it contains by reading (modifying, deleting, creating new files), or even writing (modifying, deleting, adding data), using Internet resources to carry out the said intrusion (accessing a company extranet site, for example).
Computer security...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Glossary
Article included in this offer
"Safety and risk management"
(
461 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!