Toggle navigation
home
About us
Conjugation
Translator
Vocabulary
Grammar
Nouns
Verbs
Adjectives
Adverbs
Pronouns
Prepositions
Numbers
Separable Verbs
Verb with fixed Prepositon
Language Levels
German A1
German A2
German B1
German B2
German C1
German C2
Blog
▼
Deutsch
▼
Deutsch
germantoenglish.de
Home
About
German Grammar
Nouns
Verbs
Adjectives
Adverbs
Pronouns
Prepositions
Numbers
Separable Verbs
Verb with fixed Prepositon
German Language Levels
German A1
German A2
German B1
German B2
German C1
German C2
German Vocabulary
Verb Conjugation
German to English Translator
Terms
Privacy Policy
Blogs
Contact
Social Links
Home
Cybersecurity & Digital Safety
German Cybersecurity & Digital Safety Vocabulary – Learn Words with English Meanings. Articles and Pronunciation
Cybersecurity & Digital Safety in German with articles - Check full List
List of associated Words related to Cybersecurity & Digital Safety
German Word
English Meaning
Description
Digitale Sicherheit
🔊
Digital Security
🔊
More details
Informationssicherheit
🔊
Information Security
🔊
More details
Hacking
🔊
Hacking
🔊
More details
Hackerin
🔊
Hacker
🔊
More details
Schadsoftware
🔊
Malware
🔊
More details
Trojaner
🔊
Trojan Horse
🔊
More details
Ransomware
🔊
Ransomware
🔊
More details
Spyware
🔊
Spyware
🔊
More details
Phishing-E-Mail
🔊
Phishing Email
🔊
More details
Social Engineering
🔊
Social Engineering
🔊
More details
DDoS-Angriff
🔊
DDoS Attack
🔊
More details
Brute-Force-Angriff
🔊
Brute Force Attack
🔊
More details
Zero-Day-Exploit
🔊
Zero-Day Exploit
🔊
More details
Verschlüsselung
🔊
Encryption
🔊
More details
VPN
🔊
VPN (Virtual Private Network)
🔊
More details
starkes Passwort
🔊
Strong Password
🔊
More details
Passwortmanager
🔊
Password Manager
🔊
More details
Sicherheitsupdate
🔊
Security Update
🔊
More details
personenbezogene Daten
🔊
Personal Data
🔊
More details
Datenschutzverletzung
🔊
Data Breach
🔊
More details
Datenleck
🔊
Data Leak
🔊
More details
Datenschutz-Grundverordnung
🔊
General Data Protection Regulation
🔊
More details
Cookies
🔊
Cookies
🔊
More details
Tracking
🔊
Tracking
🔊
More details
WLAN-Sicherheit
🔊
Wi-Fi Security
🔊
More details
öffentliches WLAN
🔊
Public Wi-Fi
🔊
More details
Verschlüsselungsschlüssel
🔊
Encryption Key
🔊
More details
Identitätsdiebstahl
🔊
Identity Theft
🔊
More details
biometrische Authentifizierung
🔊
Biometric Authentication
🔊
More details
Fingerabdruck
🔊
Fingerprint
🔊
More details
Gesichtserkennung
🔊
Facial Recognition
🔊
More details
Internetbetrug
🔊
Online Fraud
🔊
More details
gefälschte Website
🔊
Fake Website
🔊
More details
Identitätsnachahmung
🔊
Impersonation
🔊
More details
Catfishing
🔊
Catfishing
🔊
More details
Sicherheitsbewusstsein
🔊
Security Awareness
🔊
More details
Best Practices
🔊
Best Practices
🔊
More details
regelmäßige Sicherungskopie
🔊
Regular Backup
🔊
More details
Software-Update
🔊
Software Update
🔊
More details
Schwachstelle
🔊
Vulnerability
🔊
More details
Sicherheitslücke
🔊
Security Hole
🔊
More details
Exploit
🔊
Exploit
🔊
More details
Hintertür
🔊
Backdoor
🔊
More details
Kryptografie
🔊
Cryptography
🔊
More details
Ende-zu-Ende-Verschlüsselung
🔊
End-to-End Encryption
🔊
More details
öffentlicher Schlüssel
🔊
Public Key
🔊
More details
privater Schlüssel
🔊
Private Key
🔊
More details
Hash-Funktion
🔊
Hash Function
🔊
More details
Cyberkriminalität
🔊
Cybercrime
🔊
More details
Computerbetrug
🔊
Computer Fraud
🔊
More details
Digitale Forensik
🔊
Digital Forensics
🔊
More details
Incident Response
🔊
Incident Response
🔊
More details
White-Hat-Hacker
🔊
White Hat Hacker
🔊
More details
Black-Hat-Hacker
🔊
Black Hat Hacker
🔊
More details
Grey-Hat-Hacker
🔊
Grey Hat Hacker
🔊
More details
ethischer Hacker
🔊
Ethical Hacker
🔊
More details
Sicherheitssoftware
🔊
Security Software
🔊
More details
Penetrationstest
🔊
Penetration Testing
🔊
More details
Sicherheitsscanner
🔊
Security Scanner
🔊
More details
Keylogger
🔊
Keylogger
🔊
More details
Datenverlust
🔊
Data Loss
🔊
More details
finanzieller Verlust
🔊
Financial Loss
🔊
More details
Reputationsschaden
🔊
Reputation Damage
🔊
More details
Systemausfall
🔊
System Failure
🔊
More details
Verifizierung
🔊
Verification
🔊
More details
Verdacht
🔊
Suspicion
🔊
More details
vertrauenswürdige Quelle
🔊
Trustworthy Source
🔊
More details
Deepfake
🔊
Deepfake
🔊
More details
Cryptojacking
🔊
Cryptojacking
🔊
More details
IoT-Sicherheit
🔊
IoT Security
🔊
More details
Cloud-Sicherheit
🔊
Cloud Security
🔊
More details
sicher
🔊
Secure
🔊
More details
anfällig
🔊
Vulnerable
🔊
More details
verschlüsselt
🔊
Encrypted
🔊
More details
verdächtig
🔊
Suspicious
🔊
More details
anonym
🔊
Anonymous
🔊
More details
Cybersecurity & Digital Safety
Explore Similar Vocabulary
Emergency Services
Beauty & Cosmetics
Office Supplies & Stationery
Public Signs & Symbols
German Traditions & Daily Life
Politics, Government & Society
Cafes, Restaurants & Dining Out
Immigration, Visa & Residency