The following is a list of the top 50 cyber security terms that everyone should be familiar with: –
- Adware: Application or software displaying unsolicited advertisements on your devices.
- APT (Advanced Persistent Threat): Unauthorized user attacks and gains access to network or systems without being detected.
- Anti-Virus Software: Application program used to prevent, detect, mitigate and remediate malware.
- Authentication: A process ensuring, confirming, and verifying a user’s identity credentials.
- Back door: Secret method to bypass security and gain access to a restricted part of a network/system.
- Backup: To make copies of data stored on devices so as to reduce the potential impact of data loss.
- Baiting: Online baiting is facilitated by trapping any victim with fake incentives and profits/gains.
- Blackhat Hacker: Infringes laws and breaches computer security unethically for malicious purposes.
- Botnet: A group of internet-connected systems, including computers, servers, IoT, and mobile devices which are infected and controlled by a common malicious software operated by any blackhat hacker.
- Brute Force Attack: Repetitive successive attempts of various credential combinations.
- Bug: Error, fault, or flaw in an algorithm or a program resulting in unintended execution/behavior.
- Clickjacking: UI redressing attack creating invisible HTML page element overlaying the legitimate page.
- Cookie: Websites recognize users and devices keeping track of their preferences via stored cookies.
- Critical Update: A resolution software to address and resolve a high severity issue.
- Cyber Warfare: Cyber-attacks perpetrated by one digital entity against one/multiple other digital entities.
- Data Breach: A high-severity and a high-impact confirmed incident where a system or network data has been stolen without the consent and knowledge or authorization of the system’s or network’s owner.
- DDoS (Distributed Denial Of Service): A cyberattack aiming to disrupt an ongoing service by flooding it with malicious traffic from multiple sources or botnets affecting the availability of that service online.
- Deepfake: Videos that have human faces either swapped or morphed, leveraging AI algorithms.
- Exploit: Malicious code or script used to target vulnerabilities in systems and networks.
- Honeypots: Decoy networks or systems operationalized to lure potential attackers.
- Incident Response Policy: A plan stating the company’s response to any cyber security incident.
- Keystroke Logger: Software covertly logging the keyboard and mouse keys pressed/clicked in devices.
- Malware: Malicious software developed to cause damage to any target device or network.
- Malvertising: Using online advertisements and allied print management services to deliver malware.
- MFA (Multi-Factor Authentication): A security process where a user provides multiple authentication factors to identify themselves.
- Packet Sniffer: Software designed to monitor and record network traffic.
- Patch: A code applied after the software program has been installed to rectify an issue in that program.
- Penetration testing: Pentesting is the science of testing not only networks and systems but also websites and software to find vulnerabilities that an attacker could exploit.
- Phishing: Method to try and gather PII (Personally Identifiable Information) using deceptive emails.
- Pre-texting: Act of creating fictional narratives manipulating victims into disclosing sensitive information.
- Ransomware: Malicious software deployed to block access to devices until a sum of money is paid.
- Rootkit: A type of malware developed to stay hidden and persistent inside the hardware of devices.
- Security Awareness Training: Program aimed to improve end-user security awareness of employees.
- SOC (Security Operations Centre): Monitors digital activities to prevent, detect, mitigate and respond to any potential threats, risks, and vulnerabilities.
- Smishing: A type of phishing involving text messages to lure victims.
- Social Engineering: The art and science of manipulating people to disclose confidential information.
- Spear Phishing: Email-spoofing attack targetting a specific organization or individual to obtain PII data.
- Spyware: A type of software installing itself on devices to secretly monitor and report victims’ activities.
- Tailgating: Someone lacking proper authentication follows a legitimate employee into a restricted area.
- Trojan: Malicious software disguised as legitimate software to gain access to systems of target users.
- 2FA: A security process where a user provides two authentication factors to identify themselves.
- Virus: Malicious program on devices performing malicious activities without user’s knowledge & consent.
- Virtual Private Network (VPN): A software allowing users to stay anonymous while using internet services by masking/hiding their real location and encrypting communications traffic.
- Vulnerability: A vulnerability refers to a flaw in a system that can leave it open to attack.
- Vishing: A form of phishing to scam victims over the phone to gather PII data used for identity theft.
- Whaling: A type of phishing targeted at specific high-profile company leadership and management.
- Whitehat Hacker: Perform ethical hacking on behalf of legitimate entities and organizations.
- Worm: Computer program replicating itself to spread to other devices in the network.
- Zero-Day: A recently discovered vulnerability that hackers are using to breach into networks & systems.
Contact Centex Technologies at (254) 213 – 4740. for IT and Cybersecurity Solutions for businesses.