GovLoop

Your Cybersecurity Cheat Sheet

Unless you have an advanced degree in cybersecurity, you might be a little confused by all of the techy lingo used to define the threats to government information. How is an advanced persistent threat different from a regular threat? Is phishing what your dad makes you do on camping trips? Isn’t a troll just a mythical beast that lives under bridges? What’s a white hat hacker? Why do hackers need to wear hats at all?

The dictionary for cybersecurity is vast and a little confusing. That’s why we took the time to breakdown the most common types cyberattacks and hackers in our most recent guide, Securing Government: Lessons from the Cyber Frontlines. Our taxonomy is below:

Want to learn more about cybersecurity in government? Be sure to read our guide, Securing Government: Lessons from the Cyber Frontlines, to hear what agencies at the local, state, and federal level are doing to protect government networks from trolls, hactivists, cyber criminals, and more.

Exit mobile version