Cyber spelfouten
Veelvoorkomende foutief gespelde woorden gerelateerd aan cybercrime.
Top 100
- Phishing - fishing, phising, phishin, fhishing
- Malware - mallware, mawlware, malwear
- Ransomware - ransomeware, ransomwhere, ransome ware
- Spoofing - spoofeing, spoufing, spofing
- Encryption - incryption, encryptian, encrytion
- Hacker - haker, hackker, hackar
- Trojan - trojon, trajan, trujan
- Spyware - spayware, spiware, spywere
- Adware - addware, adwere, adwire
- Botnet - botnett, bottnet, botnete
- Firewall - firewal, fierwall, fire wall
- Antivirus - anti-virus, antivirous, antiviras
- DDoS - ddos, ddoss, dos attack
- Data breach - data breech, data brach, data breeche
- Cybersecurity - cyber security, cyber securty, cybersecuity
- Exploit - expliot, exployt, expolit
- Zero day - zero-day, zerro day, zero dey
- VPN - v.p.n., vpen, vnp
- Skimming - skiming, skyming, scamming
- Keylogger - keyloger, key logger, keyloggr
- Rootkit - root kit, rotkit, rookit
- Scam - scamm, scamms, scaam
- Social engineering - social enginering, sociel engineering, social engeneering
- Hacking - hackng, haking, hackin
- Whaling - wailing, whalling, whaleing
- Smishing - smshing, sms-phishing, smising
- Vishing - vishing, vishin, fishin
- Spam - spamm, spaam, spamming
- Patch - pach, path, petch
- Threat - thret, threate, thraet
- Vulnerability - vulnerablity, vunerability, vulneribility
- Malicious - malitious, maliscious, malisious
- Penetration testing - penetration testin, penetraion testing, pen testing
- Intrusion - intrution, intrusion, intrushion
- Credential stuffing - credential stuffin, credential stufing, credential stuffing
- Worm - worme, wurm, wrom
- Cryptojacking - cryptojacking, crypto-jacking, crypto jacking
- Pharming - pharming, farming, pharmming
- Spoof - spooph, spooff, spof
- Cyberattack - cyber attack, cyberattck, cyber atack
- Man-in-the-middle - man in the middle, man-in-middle, maninthemiddle
- DDoS mitigation - ddos mitigation, dos mitigation, ddos mitigaton
- Forensics - fornesics, forenics, forensic
- Risk assessment - risk assesment, risk asessment, risk assment
- Security breach - security brech, security brach, security breech
- Incident response - incident responce, incident respons, incident respones
- Data protection - data protecion, data protecton, data protectin
- Dark web - darkweb, dark wep, dark webb
- Deep web - deepweb, deep wep, deep webb
- IoT - i.o.t., iot, i o t
- Backdoor - back door, bakdoor, backdor
- Cyber espionage - cyber espionag, cyber espiionage, cyber esponage
- IP spoofing - ip spofing, ip spoofin, ip spoofng
- Logic bomb - logic bom, logik bomb, logic bumb
- Macro virus - macro viruse, makro virus, macro viris
- Multi-factor authentication - multifactor authentication, multi factor authentication, multy-factor authentication
- Network security - network securty, network secuirty, network securitie
- Password attack - password attak, pasword attack, password atack
- Physical security - physical securty, fisical security, physical secuity
- Privacy violation - privacy violaton, privacy violasion, privacy voilation
- Security policy - security policiy, securty policy, security policie
- Software piracy - software piarcy, sofware piracy, software piracey
- Spear phishing - spear phising, speer phishing, spear fising
- SQL injection - sql injecton, sql injection, squal injection
- SSL encryption - ssl encrytion, ssl encrypton, ssl encrption
- System security - system securty, sistem security, system secuity
- Unauthorized access - unauthorised access, unauthorized acces, unautorized access
- Web security - web securty, web secuity, web securitie
- Wireless security - wireless securty, wireless secuity, wireles security
- Access control - acess control, access controle, accses control
- Biometric security - biometric securty, biomatric security, biometric secuity
- Cloud security - cloud securty, clowd security, cloud secuity
- Cyber law - cyberlaw, cyber law, cyber lauw
- Digital forensics - digital forensic, digital forensics, digital fornesics
- Endpoint security - endpoint securty, endpoint secuity, endpoint securitie
- Fileless malware - fileless mallware, fileless malwear, fileles malware
- Hardware security - hardware securty, hardware secuity, hardware securitie
- Identity theft - identity thef, identity theft, identity theft
- Information security - information securty, information secuity, information securitie
- Malvertising - malvertising, malvertizing, malvertissing
- Network monitoring - network monitorng, network monitering, network monitorin
- Patch management - patch managment, patch managament, patch manegement
- Ransomware attack - ransomware atack, ransomware attak, ransomware atak
- Security architecture - security archetecture, security archtecture, security arhitecture
- Security audit - security audt, security audit, security audid
- Threat intelligence - threat inteligence, threat intellgence, threat intellgence
- Threat modeling - threat modelin, threat modelling, threat modelng
- Two-factor authentication - two factor authentication, two-factor authentification, twofactor authentication
- Virus detection - virus detecton, virus detecion, virus detectin
- Web application security - web application securty, web application secuity, web application securitie
- Wiretap - wire tap, wiretap, wiretapp
- Zero trust security - zero trust securty, zero trust secuity, zero trust securitie
- Zombie network - zombie netwerk, zombi network, zombie netwok
- Account takeover - account take over, account take-over, account takeoover
- Advanced persistent threat - advanced persistant threat, advanced persitent threat, advansed persistent threat
- Business email compromise - business e-mail compromise, bussiness email compromise, business email compromize
- Cyber insurance - cyber insurace, cyber insurence, cyber insuranc
- Digital identity - digital identy, digital identiti, digital identity
- Incident management - incident managment, incident managament, incident manegement
- Mobile security - mobile securty, mobile secuity, mobile securitie