Cyber spelfouten

Veelvoorkomende foutief gespelde woorden gerelateerd aan cybercrime.

Top 100

  1. Phishing - fishing, phising, phishin, fhishing
  2. Malware - mallware, mawlware, malwear
  3. Ransomware - ransomeware, ransomwhere, ransome ware
  4. Spoofing - spoofeing, spoufing, spofing
  5. Encryption - incryption, encryptian, encrytion
  6. Hacker - haker, hackker, hackar
  7. Trojan - trojon, trajan, trujan
  8. Spyware - spayware, spiware, spywere
  9. Adware - addware, adwere, adwire
  10. Botnet - botnett, bottnet, botnete
  11. Firewall - firewal, fierwall, fire wall
  12. Antivirus - anti-virus, antivirous, antiviras
  13. DDoS - ddos, ddoss, dos attack
  14. Data breach - data breech, data brach, data breeche
  15. Cybersecurity - cyber security, cyber securty, cybersecuity
  16. Exploit - expliot, exployt, expolit
  17. Zero day - zero-day, zerro day, zero dey
  18. VPN - v.p.n., vpen, vnp
  19. Skimming - skiming, skyming, scamming
  20. Keylogger - keyloger, key logger, keyloggr
  21. Rootkit - root kit, rotkit, rookit
  22. Scam - scamm, scamms, scaam
  23. Social engineering - social enginering, sociel engineering, social engeneering
  24. Hacking - hackng, haking, hackin
  25. Whaling - wailing, whalling, whaleing
  26. Smishing - smshing, sms-phishing, smising
  27. Vishing - vishing, vishin, fishin
  28. Spam - spamm, spaam, spamming
  29. Patch - pach, path, petch
  30. Threat - thret, threate, thraet
  31. Vulnerability - vulnerablity, vunerability, vulneribility
  32. Malicious - malitious, maliscious, malisious
  33. Penetration testing - penetration testin, penetraion testing, pen testing
  34. Intrusion - intrution, intrusion, intrushion
  35. Credential stuffing - credential stuffin, credential stufing, credential stuffing
  36. Worm - worme, wurm, wrom
  37. Cryptojacking - cryptojacking, crypto-jacking, crypto jacking
  38. Pharming - pharming, farming, pharmming
  39. Spoof - spooph, spooff, spof
  40. Cyberattack - cyber attack, cyberattck, cyber atack
  41. Man-in-the-middle - man in the middle, man-in-middle, maninthemiddle
  42. DDoS mitigation - ddos mitigation, dos mitigation, ddos mitigaton
  43. Forensics - fornesics, forenics, forensic
  44. Risk assessment - risk assesment, risk asessment, risk assment
  45. Security breach - security brech, security brach, security breech
  46. Incident response - incident responce, incident respons, incident respones
  47. Data protection - data protecion, data protecton, data protectin
  48. Dark web - darkweb, dark wep, dark webb
  49. Deep web - deepweb, deep wep, deep webb
  50. IoT - i.o.t., iot, i o t
  51. Backdoor - back door, bakdoor, backdor
  52. Cyber espionage - cyber espionag, cyber espiionage, cyber esponage
  53. IP spoofing - ip spofing, ip spoofin, ip spoofng
  54. Logic bomb - logic bom, logik bomb, logic bumb
  55. Macro virus - macro viruse, makro virus, macro viris
  56. Multi-factor authentication - multifactor authentication, multi factor authentication, multy-factor authentication
  57. Network security - network securty, network secuirty, network securitie
  58. Password attack - password attak, pasword attack, password atack
  59. Physical security - physical securty, fisical security, physical secuity
  60. Privacy violation - privacy violaton, privacy violasion, privacy voilation
  61. Security policy - security policiy, securty policy, security policie
  62. Software piracy - software piarcy, sofware piracy, software piracey
  63. Spear phishing - spear phising, speer phishing, spear fising
  64. SQL injection - sql injecton, sql injection, squal injection
  65. SSL encryption - ssl encrytion, ssl encrypton, ssl encrption
  66. System security - system securty, sistem security, system secuity
  67. Unauthorized access - unauthorised access, unauthorized acces, unautorized access
  68. Web security - web securty, web secuity, web securitie
  69. Wireless security - wireless securty, wireless secuity, wireles security
  70. Access control - acess control, access controle, accses control
  71. Biometric security - biometric securty, biomatric security, biometric secuity
  72. Cloud security - cloud securty, clowd security, cloud secuity
  73. Cyber law - cyberlaw, cyber law, cyber lauw
  74. Digital forensics - digital forensic, digital forensics, digital fornesics
  75. Endpoint security - endpoint securty, endpoint secuity, endpoint securitie
  76. Fileless malware - fileless mallware, fileless malwear, fileles malware
  77. Hardware security - hardware securty, hardware secuity, hardware securitie
  78. Identity theft - identity thef, identity theft, identity theft
  79. Information security - information securty, information secuity, information securitie
  80. Malvertising - malvertising, malvertizing, malvertissing
  81. Network monitoring - network monitorng, network monitering, network monitorin
  82. Patch management - patch managment, patch managament, patch manegement
  83. Ransomware attack - ransomware atack, ransomware attak, ransomware atak
  84. Security architecture - security archetecture, security archtecture, security arhitecture
  85. Security audit - security audt, security audit, security audid
  86. Threat intelligence - threat inteligence, threat intellgence, threat intellgence
  87. Threat modeling - threat modelin, threat modelling, threat modelng
  88. Two-factor authentication - two factor authentication, two-factor authentification, twofactor authentication
  89. Virus detection - virus detecton, virus detecion, virus detectin
  90. Web application security - web application securty, web application secuity, web application securitie
  91. Wiretap - wire tap, wiretap, wiretapp
  92. Zero trust security - zero trust securty, zero trust secuity, zero trust securitie
  93. Zombie network - zombie netwerk, zombi network, zombie netwok
  94. Account takeover - account take over, account take-over, account takeoover
  95. Advanced persistent threat - advanced persistant threat, advanced persitent threat, advansed persistent threat
  96. Business email compromise - business e-mail compromise, bussiness email compromise, business email compromize
  97. Cyber insurance - cyber insurace, cyber insurence, cyber insuranc
  98. Digital identity - digital identy, digital identiti, digital identity
  99. Incident management - incident managment, incident managament, incident manegement
  100. Mobile security - mobile securty, mobile secuity, mobile securitie