{"componentChunkName":"component---src-pages-dictionary-tsx","path":"/dictionary/","result":{"data":{"allContentfulDictionaryTerm":{"nodes":[{"title":"Account Takeover ","slug":"account-takeover"},{"title":"Advanced Persistent Threat (APT)","slug":"advanced-persistent-threat-apt"},{"title":"Adware","slug":"adware"},{"title":"Anonymizing proxy","slug":"anonymizing-proxy"},{"title":"Antispyware","slug":"antispyware"},{"title":"Antivirus","slug":"antivirus"},{"title":"Authentication","slug":"authentication"},{"title":"Autorun worm","slug":"autorun-worm"},{"title":"Backdoor Trojan","slug":"backdoor-trojan"},{"title":"Blacklist","slug":"blacklist"},{"title":"Block Page","slug":"block-page"},{"title":"Bluetooth","slug":"bluetooth"},{"title":"Boot Sector Malware","slug":"boot-sector-malware"},{"title":"Botnet","slug":"botnet"},{"title":"Browser","slug":"browser"},{"title":"Browser Hijacker","slug":"browser-hijacker"},{"title":"Browser Protection","slug":"browser-protection"},{"title":"Browsing Activity","slug":"browsing-activity"},{"title":"Brute Force Attack","slug":"brute-force-attack"},{"title":"Bug","slug":"bug"},{"title":"CVE (Common Vulnerabilities and Exposures)","slug":"cve-common-vulnerabilities-and-exposures"},{"title":"Catfishing","slug":"catfishing"},{"title":"Clickbait / Clickjacking","slug":"clickbait-clickjacking"},{"title":"Cloud","slug":"cloud"},{"title":"Command and Control Center","slug":"command-and-control-center"},{"title":"Compromised","slug":"compromised"},{"title":"Cookie","slug":"cookie"},{"title":"Cracking","slug":"cracking"},{"title":"Credential Theft","slug":"credential-theft"},{"title":"Cybersecurity","slug":"cybersecurity"},{"title":"DDoS","slug":"ddos"},{"title":"DNs Hijacking","slug":"dns-hijacking"},{"title":"Dark Web","slug":"dark-web"},{"title":"Data Breach","slug":"data-breach"},{"title":"Data Theft","slug":"data-theft"},{"title":"Database","slug":"database"},{"title":"Denial-of-service attack","slug":"denial-of-service-attack"},{"title":"Different types of hackers","slug":"hacking"},{"title":"Domain","slug":"domain"},{"title":"Download","slug":"download"},{"title":"Drive-by downloads","slug":"drive-by-downloads"},{"title":"Easter Egg","slug":"easter-egg"},{"title":"Encryption","slug":"encryption"},{"title":"Exploit","slug":"exploit"},{"title":"Extension","slug":"extension"},{"title":"FTP (File Transfer Protocol)","slug":"ftp-file-transfer-protocol"},{"title":"Fingerprint","slug":"fingerprint"},{"title":"Firewall","slug":"firewall"},{"title":"GDPR General Data Protection Regulation","slug":"gdpr-general-data-protection-regulation"},{"title":"Gateway Security","slug":"gateway-security"},{"title":"Ghosting Scams","slug":"ghosting-scams"},{"title":"Guardio","slug":"guardio"},{"title":"HTTPS","slug":"https"},{"title":"Hashing","slug":"hashing"},{"title":"Hoax","slug":"hoax"},{"title":"Honeypot","slug":"honeypot"},{"title":"IP Address","slug":"ip-address"},{"title":"IPsec","slug":"ipsec"},{"title":"ISP (Internet Service Provider)","slug":"isp-internet-service-provider"},{"title":"Identity Theft","slug":"identity-theft"},{"title":"Incident Handling","slug":"incident-handling"},{"title":"Infostealers","slug":"infostealers"},{"title":"Internet Worm","slug":"internet-worm"},{"title":"JBOH attack","slug":"jboh-attack"},{"title":"Juice Jacking","slug":"juice-jacking"},{"title":"Kaptoxa","slug":"kaptoxa"},{"title":"Klez","slug":"klez"},{"title":"Knowledge-Based Authentication","slug":"knowledge-based-authentication"},{"title":"Kraken","slug":"kraken"},{"title":"Lawful Interception","slug":"lawful-interception"},{"title":"Link Jacking","slug":"link-jacking"},{"title":"Live Capture","slug":"live-capture"},{"title":"Logic Bomb","slug":"logic-bomb"},{"title":"Malicious Code","slug":"malicious-code"},{"title":"Malicious Links","slug":"malicious-links"},{"title":"Malvertising","slug":"malvertising"},{"title":"Malware","slug":"malware"},{"title":"Man-In-The-Middle Attack","slug":"man-in-the-middle-attack"},{"title":"Masquerade Attack","slug":"masquerade-attack"},{"title":"Mobile Phone Malware","slug":"mobile-phone-malware"},{"title":"National Computer Security Center (NCSC)","slug":"national-computer-security-center-ncsc"},{"title":"National Security Agency (NSA)","slug":"national-security-agency-nsa"},{"title":"Network","slug":"network"},{"title":"Network Sniffing","slug":"network-sniffing"},{"title":"Network Vulnerability Scanning","slug":"network-vulnerability-scanning"},{"title":"Nimda","slug":"nimda"},{"title":"Online Scams","slug":"online-scams"},{"title":"Open Source Code","slug":"open-source-code"},{"title":"Open Source Hardening Project","slug":"open-source-hardening-project"},{"title":"Operating System","slug":"operating-system"},{"title":"Over-the-air attack","slug":"over-the-air-attack"},{"title":"Packet","slug":"packet"},{"title":"Parasitic Viruses","slug":"parasitic-viruses"},{"title":"Patch","slug":"patch"},{"title":"Payment Card Skimmer","slug":"payment-card-skimmer"},{"title":"Pharming","slug":"pharming"},{"title":"Phishing","slug":"phishing"},{"title":"Pig Butchering Scams","slug":"pig-butchering-scams"},{"title":"Pop up blocker","slug":"pop-up-blocker"},{"title":"Potentially Unwanted Application (PUA)","slug":"potentially-unwanted-application-pua"},{"title":"Pretexting","slug":"pretexting"},{"title":"Push Notifications (web","slug":"push-notifications-web"},{"title":"Quarantining","slug":"quarantining"},{"title":"Ransomware","slug":"ransomware"},{"title":"Remote Access Scams","slug":"remote-access-scams"},{"title":"Restore","slug":"restore"},{"title":"Reverse Engineering","slug":"reverse-engineering"},{"title":"Rootkit","slug":"rootkit"},{"title":"SQL Injection? ","slug":"sql-injection"},{"title":"SSL Certificate","slug":"ssl-certificate"},{"title":"Scareware","slug":"scareware"},{"title":"Search Hijacking","slug":"search-hijacking"},{"title":"Smishing","slug":"smishing"},{"title":"Social Engineering","slug":"social-engineering"},{"title":"Social Networking","slug":"social-networking"},{"title":"Software","slug":"software"},{"title":"Spam: What is it and How is it Harmful?","slug":"spam"},{"title":"Spoofing","slug":"spoofing"},{"title":"Spyware","slug":"spyware"},{"title":"Tech Support Scam","slug":"tech-support-scam"},{"title":"Threat","slug":"threat"},{"title":"Trojan","slug":"trojan"},{"title":"URL (Uniform resource locator)","slug":"url-uniform-resource-locator"},{"title":"URL or Web Content Filtering","slug":"url-or-web-content-filtering"},{"title":"Unauthorized access","slug":"unauthorized-access"},{"title":"VPN (Virtual Private Network)","slug":"vpn-virtual-private-network"},{"title":"Virus","slug":"virus"},{"title":"Vishing","slug":"vishing"},{"title":"VoIP","slug":"voip"},{"title":"WiFi","slug":"wifi"},{"title":"Wiretapping","slug":"wiretapping"},{"title":"Worm","slug":"worm"},{"title":"XSS","slug":"xss"},{"title":"Xafecopy","slug":"xafecopy"},{"title":"Yahoo Search Virus","slug":"yahoo-search-virus"},{"title":"YubiKey","slug":"yubikey"},{"title":"Zero-day attack","slug":"zero-day-attack"},{"title":"Zero-day vulnerability","slug":"zero-day-vulnerability"},{"title":"Zeus Game Over","slug":"zeus-game-over"},{"title":"Zip Bomb","slug":"zip-bomb"},{"title":"Zombie Computer","slug":"zombie-computer"}]}},"pageContext":{"breadcrumb":{"location":"/dictionary/","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"}]}}},"staticQueryHashes":["1614255152"]}