The following is a list of the top 50 cyber security terms that everyone should be familiar with: –
- Adware: Application or software displaying unsolicited advertisements on your devices.
 - APT (Advanced Persistent Threat): Unauthorized user attacks and gains access to network or systems without being detected.
 - Anti-Virus Software: Application program used to prevent, detect, mitigate and remediate malware.
 - Authentication: A process ensuring, confirming, and verifying a user’s identity credentials.
 - Back door: Secret method to bypass security and gain access to a restricted part of a network/system.
 - Backup: To make copies of data stored on devices so as to reduce the potential impact of data loss.
 - Baiting: Online baiting is facilitated by trapping any victim with fake incentives and profits/gains.
 - Blackhat Hacker: Infringes laws and breaches computer security unethically for malicious purposes.
 - Botnet: A group of internet-connected systems, including computers, servers, IoT, and mobile devices which are infected and controlled by a common malicious software operated by any blackhat hacker.
 - Brute Force Attack: Repetitive successive attempts of various credential combinations.
 - Bug: Error, fault, or flaw in an algorithm or a program resulting in unintended execution/behavior.
 - Clickjacking: UI redressing attack creating invisible HTML page element overlaying the legitimate page.
 - Cookie: Websites recognize users and devices keeping track of their preferences via stored cookies.
 - Critical Update: A resolution software to address and resolve a high severity issue.
 - Cyber Warfare: Cyber-attacks perpetrated by one digital entity against one/multiple other digital entities.
 - Data Breach: A high-severity and a high-impact confirmed incident where a system or network data has been stolen without the consent and knowledge or authorization of the system’s or network’s owner.
 - DDoS (Distributed Denial Of Service): A cyberattack aiming to disrupt an ongoing service by flooding it with malicious traffic from multiple sources or botnets affecting the availability of that service online.
 - Deepfake: Videos that have human faces either swapped or morphed, leveraging AI algorithms.
 - Exploit: Malicious code or script used to target vulnerabilities in systems and networks.
 - Honeypots: Decoy networks or systems operationalized to lure potential attackers.
 - Incident Response Policy: A plan stating the company’s response to any cyber security incident.
 - Keystroke Logger: Software covertly logging the keyboard and mouse keys pressed/clicked in devices.
 - Malware: Malicious software developed to cause damage to any target device or network.
 - Malvertising: Using online advertisements and allied print management services to deliver malware.
 - MFA (Multi-Factor Authentication): A security process where a user provides multiple authentication factors to identify themselves.
 - Packet Sniffer: Software designed to monitor and record network traffic.
 - Patch: A code applied after the software program has been installed to rectify an issue in that program.
 - Penetration testing: Pentesting is the science of testing not only networks and systems but also websites and software to find vulnerabilities that an attacker could exploit.
 - Phishing: Method to try and gather PII (Personally Identifiable Information) using deceptive emails.
 - Pre-texting: Act of creating fictional narratives manipulating victims into disclosing sensitive information.
 - Ransomware: Malicious software deployed to block access to devices until a sum of money is paid.
 - Rootkit: A type of malware developed to stay hidden and persistent inside the hardware of devices.
 - Security Awareness Training: Program aimed to improve end-user security awareness of employees.
 - SOC (Security Operations Centre): Monitors digital activities to prevent, detect, mitigate and respond to any potential threats, risks, and vulnerabilities.
 - Smishing: A type of phishing involving text messages to lure victims.
 - Social Engineering: The art and science of manipulating people to disclose confidential information.
 - Spear Phishing: Email-spoofing attack targetting a specific organization or individual to obtain PII data.
 - Spyware: A type of software installing itself on devices to secretly monitor and report victims’ activities.
 - Tailgating: Someone lacking proper authentication follows a legitimate employee into a restricted area.
 - Trojan: Malicious software disguised as legitimate software to gain access to systems of target users.
 - 2FA: A security process where a user provides two authentication factors to identify themselves.
 - Virus: Malicious program on devices performing malicious activities without user’s knowledge & consent.
 - Virtual Private Network (VPN): A software allowing users to stay anonymous while using internet services by masking/hiding their real location and encrypting communications traffic.
 - Vulnerability: A vulnerability refers to a flaw in a system that can leave it open to attack.
 - Vishing: A form of phishing to scam victims over the phone to gather PII data used for identity theft.
 - Whaling: A type of phishing targeted at specific high-profile company leadership and management.
 - Whitehat Hacker: Perform ethical hacking on behalf of legitimate entities and organizations.
 - Worm: Computer program replicating itself to spread to other devices in the network.
 - Zero-Day: A recently discovered vulnerability that hackers are using to breach into networks & systems.
 
Contact Centex Technologies at (254) 213 – 4740. for IT and Cybersecurity Solutions for businesses.
