Botnet 🟠 Attack tool

A botnet is a network of devices (computers, phones, etc.) infected with malicious software that can be remotely controlled by cybercriminals to carry out malicious tasks, such as sending spam or launching Denial of Service (DDoS) attacks.

CERT 🟩 Security team

A CERT (Computer Emergency Response Team) is a specialised cybersecurity team dedicated to managing large-scale IT security incidents. In French, the term CERT or CSIRT (Computer Security Incident Response Team) is sometimes used.

Trojan horse 🔴 Attack

A Trojan horse is a type of malicious software that downloads itself onto a computer, disguised as a legitimate program, to trick the user and infiltrate their system.

TYPE : 🔴 Computer attack
FREQUENCY: 💣💣💣💣
DANGEROUS: 💀💀💀💀💀

Unlike computer viruses, which replicate themselves automatically, Trojan horses require action on the part of the user to install themselves.

Encryption 🔒

Encryption, also known as cryptography in everyday language although this term is inappropriate, is a technique which consists of transforming understandable data, known as plaintext data, into an unreadable and incomprehensible format, known as encrypted data, using mathematical algorithms and one or more encryption keys.

This transformation ensures that only people with the decryption key (or the corresponding keys in the case of two-key systems) can read and understand the original content.

The aim is to protect the confidentiality, integrity and sometimes authenticity of information, by preventing it from being consulted or modified by unauthorised persons.
The aim is to protect the confidentiality, integrity and sometimes authenticity of information, by preventing it from being consulted or modified by unauthorised persons.