Governance 🟩 Tool

In cyber security, governance is the set of processes, policies and structures designed to align IT security with organisational objectives, in order to protect systems and data while ensuring regulatory compliance.

Ethical hacker 🟢 Profession

An ethical hacker is a computer security expert who uses his or her skills in a legal and authorised manner to test and improve the security of computer systems.
This is often called a pentester.

Phishing 🔴 Attack

Phishing is a fraudulent technique that consists of usurping the identity of a trusted person or organisation (bank, administration, online service, etc.) in order to obtain sensitive personal information (login details, bank card numbers, etc.).

SQL injection 🔴 Attack

SQL injection (SQLi) is a malicious technique used by attackers to compromise the security of a web application.

It involves inserting malicious SQL code into the input fields of a web application in order to manipulate the underlying database. It exploits vulnerabilities in the way the application processes user input and constructs its SQL queries.

Injection 🔴 Attack

An injection is a technique used by cybercriminals to insert malicious code into a computer system.

Once executed, this code can enable the attacker to :

Stealing sensitive data: personal and financial information, etc.
Take control of the system: to use it for malicious purposes (for example, to launch attacks against other systems).
Degrading services: by making a website or application unavailable (denial of service attack).