• content/en-za/images/repository/isc/2017-images/web-img-18.jpg

    What is Cloud Antivirus?

    Industry definition for the term Cloud Antivirus. Cloud antivirus programs offload antivirus workloads to a cloud-based server, rather than bogging down a user's computer…

    Read more >
  • content/en-za/images/repository/isc/2017-images/VoIP.jpg

    What Is Voice Over IP (VoIP)?

    Voice over IP (VoIP) is a communication innovation that businesses and residential homes are using more and more. Make sure to learn more about it here.

    Read more >
  • content/en-za/images/repository/isc/2017-images/KSY-54-What_is_data_mining_.jpg

    What is Data Mining?

    Data mining is the process of sifting through large sets of data to find pertinent information. Learn about who uses this process and for what purpose.

    Read more >
  • content/en-za/images/repository/isc/2017-images/Replay-Attack.jpg

    What Is a Replay Attack?

    Patch management is the strategy that dictates when new pieces of code, known as patches, are installed on existing software to improve how it operates and protect it from emerging cyber threats.

    Read more >
  • content/en-za/images/repository/isc/smurf-attack-thumbnail.jpg

    What is a Smurf Attack?

    A Smurf attack is a form of a distributed denial of service (DDoS) attack that renders computer networks inoperable. The Smurf program accomplishes this by exploiting vulnerabilities of the Internet Protocol (IP) and Internet Control Message Protocols (ICMP).

    Read more >
  • content/en-za/images/repository/isc/2017-images/malware-img-04.jpg

    What is Ransomware?

    Industry definition for the term Ransomware. Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.

    Read more >
  • content/en-za/images/repository/isc/2017-images/ksy-22-what-is-the-koobface-malware.jpg

    What Is the Koobface Virus?

    The Koobface Virus is a worm that uses social engineering and phishing to infiltrate systems and steal data. Learn more about this threat here.

    Read more >
  • content/en-za/images/repository/isc/2017-images/malware-img-03.jpg

    What is a Smurf Attack?

    Industry definition for the term Smurf Attack. A Smurf attack is a form of a distributed denial of service (DDoS) attack that renders computer networks inoperable. The smurf program...

    Read more >
  • content/en-za/images/repository/isc/2017-images/ksy-05-what-is-bitcoin.jpg

    What Is Bitcoin?

    Investors and journalists have likened the craze for investment in cryptocurrencies like Bitcoin to the American Gold Rush of the mid-1800s. Others compare the mania for the digital currency to the Dutch craze for tulips in the 1700s. It remains to be seen whether Bitcoin and its digital cousins will endure and become a new gold standard or lead the market into collapse like the Dutch tulip mania.

    Read more >
  • content/en-za/images/repository/isc/2017-images/malware-img-05.jpg

    Social Engineering - Definition

    Social engineering is how cybercriminals lure users into unwittingly infecting their computers or compromising their sensitive data. Learn the risks and how to protect yourself here.

    Read more >
Resources not available.