Glossary of Cybersecurity Terms



  • Adware: Software that automatically displays or downloads advertising material when a user is online.
  • Authentication: The process of verifying the identity of a user, device, or system.
  • Backdoor: A hidden method for bypassing security to gain unauthorized access to a system.
  • Botnet: A network of compromised computers controlled by an attacker to perform malicious activities.
  • Brute Force Attack: A trial-and-error method used to guess passwords or encryption keys.
  • Cloud Security: Measures and technologies used to protect data, applications, and infrastructure in cloud environments.
  • Cryptography: The practice of securing information by transforming it into an unreadable format (encryption).
  • Data Breach: An incident where sensitive, protected, or confidential data is accessed or disclosed without authorization.
  • Denial of Service (DoS): An attack that disrupts services by overwhelming a system with traffic or requests.
  • Distributed Denial of Service (DDoS): A DoS attack launched from multiple systems simultaneously.
  • Encryption: The process of converting data into a coded format to prevent unauthorized access.
  • Endpoint Security: Protecting endpoints (e.g., laptops, smartphones) from cyber threats.
  • Firewall: A network security system that monitors and controls incoming and outgoing traffic based on security rules.
  • Hacker: An individual who exploits vulnerabilities in systems for malicious purposes or ethical testing.
  • Identity Theft: The fraudulent acquisition and use of someone else's personal information.
  • Intrusion Detection System (IDS): A tool that monitors network traffic for suspicious activity.
  • Intrusion Prevention System (IPS): A tool that detects and blocks suspicious activity in real time.
  • Keylogger: Malware that records keystrokes to steal sensitive information like passwords.
  • Malware: Malicious software designed to damage, disrupt, or gain unauthorized access to systems.
  • Multi-Factor Authentication (MFA): A security mechanism that requires multiple forms of verification to access a system.
  • Phishing: A social engineering attack where attackers trick victims into revealing sensitive information.
  • Ransomware: Malware that encrypts a victim's data and demands payment for its release.
  • Rootkit: Malware that provides privileged access to a system while hiding its presence.
  • Social Engineering: Manipulating individuals into divulging confidential information.
  • Spyware: Software that secretly monitors and collects user data.
  • Trojan Horse: Malware disguised as legitimate software to gain access to a system.
  • Virus: Malicious code that attaches itself to legitimate programs and spreads to other systems.
  • Vulnerability: A weakness in a system that can be exploited by attackers.
  • Zero-Day Exploit: An attack that targets a previously unknown vulnerability.
  • Advanced Persistent Threat (APT): A prolonged and targeted cyberattack by a skilled adversary.
  • Biometric Authentication: Using unique biological traits (e.g., fingerprints, facial recognition) for verification.
  • Data Loss Prevention (DLP): Strategies and tools to prevent unauthorized data transfer or leakage.
  • Endpoint Detection and Response (EDR): Tools that monitor and respond to threats on endpoints.
  • Honeypot: A decoy system designed to attract and detect attackers.
  • Incident Response: The process of managing and mitigating cybersecurity incidents.
  • Network Segmentation: Dividing a network into smaller parts to limit the spread of threats.
  • Penetration Testing: Simulating cyberattacks to identify vulnerabilities in a system.
  • Public Key Infrastructure (PKI): A framework for managing digital certificates and encryption keys.
  • Sandboxing: Isolating untrusted code or applications in a secure environment for testing.
  • Security Information and Event Management (SIEM): Tools that provide real-time analysis of security alerts.
  • Threat Intelligence: Information about potential or current threats to an organization.
  • Two-Factor Authentication (2FA): A form of MFA that requires two types of verification.
  • Whitelisting: Allowing only approved applications or users to access a system.
  • Zero Trust: A security model that assumes no user or device is trusted by default.
  • Bot: An automated program that performs tasks, often used maliciously in botnets.
  • Data Encryption Standard (DES): An older encryption standard replaced by AES.
  • Man-in-the-Middle (MitM) Attack: An attack where an attacker intercepts and alters communication between two parties.
  • Patch: A software update that fixes vulnerabilities or improves functionality.
  • Shadow IT: The use of unauthorized software or hardware within an organization.



Contact

info@cyberawareness4all.com