Posts Tagged Cybersecurity Terminology

Cybersecurity Terminology That Everyone Should Know

The following is a list of the top 50 cyber security terms that everyone should be familiar with: –

  1. Adware: Application or software displaying unsolicited advertisements on your devices.
  2. APT (Advanced Persistent Threat): Unauthorized user attacks and gains access to network or systems without being detected.
  3. Anti-Virus Software: Application program used to prevent, detect, mitigate and remediate malware.
  4. Authentication: A process ensuring, confirming, and verifying a user’s identity credentials.
  5. Back door: Secret method to bypass security and gain access to a restricted part of a network/system.
  6. Backup: To make copies of data stored on devices so as to reduce the potential impact of data loss.
  7. Baiting: Online baiting is facilitated by trapping any victim with fake incentives and profits/gains.
  8. Blackhat Hacker: Infringes laws and breaches computer security unethically for malicious purposes.
  9. Botnet: A group of internet-connected systems, including computers, servers, IoT, and mobile devices which are infected and controlled by a common malicious software operated by any blackhat hacker.
  10. Brute Force Attack: Repetitive successive attempts of various credential combinations.
  11. Bug: Error, fault, or flaw in an algorithm or a program resulting in unintended execution/behavior.
  12. Clickjacking: UI redressing attack creating invisible HTML page element overlaying the legitimate page.
  13. Cookie: Websites recognize users and devices keeping track of their preferences via stored cookies.
  14. Critical Update: A resolution software to address and resolve a high severity issue.
  15. Cyber Warfare: Cyber-attacks perpetrated by one digital entity against one/multiple other digital entities.
  16. Data Breach: A high-severity and a high-impact confirmed incident where a system or network data has been stolen without the consent and knowledge or authorization of the system’s or network’s owner.
  17. DDoS (Distributed Denial Of Service): A cyberattack aiming to disrupt an ongoing service by flooding it with malicious traffic from multiple sources or botnets affecting the availability of that service online.
  18. Deepfake: Videos that have human faces either swapped or morphed, leveraging AI algorithms.
  19. Exploit: Malicious code or script used to target vulnerabilities in systems and networks.
  20. Honeypots: Decoy networks or systems operationalized to lure potential attackers.
  21. Incident Response Policy: A plan stating the company’s response to any cyber security incident.
  22. Keystroke Logger: Software covertly logging the keyboard and mouse keys pressed/clicked in devices.
  23. Malware: Malicious software developed to cause damage to any target device or network.
  24. Malvertising: Using online advertisements and allied print management services to deliver malware.
  25. MFA (Multi-Factor Authentication): A security process where a user provides multiple authentication factors to identify themselves.
  26. Packet Sniffer: Software designed to monitor and record network traffic.
  27. Patch: A code applied after the software program has been installed to rectify an issue in that program.
  28. Penetration testing: Pentesting is the science of testing not only networks and systems but also websites and software to find vulnerabilities that an attacker could exploit.
  29. Phishing: Method to try and gather PII (Personally Identifiable Information) using deceptive emails.
  30. Pre-texting: Act of creating fictional narratives manipulating victims into disclosing sensitive information.
  31. Ransomware: Malicious software deployed to block access to devices until a sum of money is paid.
  32. Rootkit: A type of malware developed to stay hidden and persistent inside the hardware of devices.
  33. Security Awareness Training: Program aimed to improve end-user security awareness of employees.
  34. SOC (Security Operations Centre): Monitors digital activities to prevent, detect, mitigate and respond to any potential threats, risks, and vulnerabilities.
  35. Smishing: A type of phishing involving text messages to lure victims.
  36. Social Engineering: The art and science of manipulating people to disclose confidential information.
  37. Spear Phishing: Email-spoofing attack targetting a specific organization or individual to obtain PII data.
  38. Spyware: A type of software installing itself on devices to secretly monitor and report victims’ activities.
  39. Tailgating: Someone lacking proper authentication follows a legitimate employee into a restricted area.
  40. Trojan: Malicious software disguised as legitimate software to gain access to systems of target users.
  41. 2FA: A security process where a user provides two authentication factors to identify themselves.
  42. Virus: Malicious program on devices performing malicious activities without user’s knowledge & consent.
  43. Virtual Private Network (VPN): A software allowing users to stay anonymous while using internet services by masking/hiding their real location and encrypting communications traffic.
  44. Vulnerability: A vulnerability refers to a flaw in a system that can leave it open to attack.
  45. Vishing: A form of phishing to scam victims over the phone to gather PII data used for identity theft.
  46. Whaling: A type of phishing targeted at specific high-profile company leadership and management.
  47. Whitehat Hacker: Perform ethical hacking on behalf of legitimate entities and organizations.
  48. Worm: Computer program replicating itself to spread to other devices in the network.
  49. Zero-Day: A recently discovered vulnerability that hackers are using to breach into networks & systems.

Contact Centex Technologies at (254) 213 – 4740. for IT and Cybersecurity Solutions for businesses.

, , , , ,

No Comments