Term | Definition |
---|---|
Immutable storage |
Immutable storage is a data storage method that prevents data from being modified or deleted after it has been created. It uses the write-once-read-many (WORM) technology to ensure that data can only be read, but not overwritten.
|
impersonation |
In cybersecurity, impersonation refers to a deceptive tactic where a malicious actor assumes the identity of a legitimate or trusted individual, organization, or system with the intent to deceive a target. The goal is to trick the victim into performing actions that benefit the attacker, such as divulging sensitive information (e.g., credentials, financial data), making fraudulent payments, or granting unauthorized access to systems or networks. Impersonation attacks often leverage social engineering techniques and can manifest through various channels, including email (e.g., Business Email Compromise - BEC, CEO fraud), phone calls (vishing), text messages (smishing), fake websites, or compromised social media accounts.
Synonyms -
Impersonation |
insider threat | When an employee, partner or contractor of an organisation maliciously (both intentionally and not intentionally) causes damage to an organisation's cyber security infrastructure. |
Invoice fraud |
Invoice fraud is a deceptive scheme where criminals trick businesses into paying money into a fraudulent bank account, often by impersonating a legitimate supplier or business partner. This is commonly achieved by sending fake invoices, altering payment details on real invoices, or even sending invoices for services never rendered. The goal is to divert funds intended for genuine transactions into the fraudster's control.
|
ip address | A unique string of character that identifies each computer using the Internet Protocol to communication over a network |