Identity theft

Identity theft in cybersecurity is a form of cybercrime that consists of seizing the digital identity of a person or entity in order to commit fraudulent acts.

Attack vector

An attack vector is the specific method or path that a cyber attacker uses to exploit a vulnerability within the attack surface of a system, network, application or organisation. It represents the concrete access path used by the attacker to carry out an intrusion and compromise the system, network, application or organisation.

Virus 🔴 Attack

A virus is a type of malicious software (malware) that, once executed, reproduces itself by inserting copies of itself into other programs or files on a computer. It can also modify or destroy data.

Data theft 🔴 Attack

Data theft is a malicious act aimed at appropriating confidential information without authorisation.

VPN (virtual private network) 🟢 Protection

A VPN (Virtual Private Network) is a technology that establishes a secure, encrypted connection between a user device and a remote server.

This connection protects the data transmitted, masks the user's IP address and ensures anonymity and confidentiality online.

A distinction must be made between :

VPN (the technology) that secures your connections and protects your privacy.
The VPN client (the software), which is the application you install to take advantage of this technology

A corporate VPN is a virtual private network designed specifically for the needs of professional organisations. It enables employees to securely access internal corporate resources (applications, data, tools) from remote locations, by creating an encrypted connection between their devices and the corporate network via the Internet.