1) Vulnerability - the quality or state of being exposed to the possibility of being attacked or harmed on the internet
2) Authentication - The process of identifying a user’s identity, making sure that they can have access to the system and/or files
3) Firewall - Any technology, be it software or hardware, used to keep intruders out.
4) Botnet - a botnet is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
5) Domain - how the internet is structured, and domain also refers to how an organization's network resources are organized.
6) Encryption - is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.
7) Exploit - a code that takes advantage of a software vulnerability or security flaw
8) Malware - a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
9) Phishing - A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site
10) Ransomware - a malware designed to deny a user or organization access to files on their computer
11) Spoofing - the act of disguising a communication from an unknown source as being from a known, trusted source
12) Spyware - malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
13) Virus - A computer program that can copy itself and infect a computer without permission or knowledge of the user.