top of page
Search

The ABC's...

Updated: Oct 5, 2024

Welcome to your guide to cybersecurity terminology! Whether you're just starting your journey in the digital security world or looking to brush up on your knowledge, this glossary covers essential terms related to devices, protocols, and security attacks. Let's dive in!

A

Access Control: The practice of restricting access to resources based on user authentication and authorization. This is crucial for maintaining security within an organization. Example: A company using keycards to limit employee access to specific areas of the building, ensuring that only authorized personnel can enter sensitive locations.

Adware: Software that automatically displays or downloads advertising material when a user is online. While some adware is harmless, it can often lead to a poor user experience. Example: Free mobile games that show frequent ads during gameplay, which can be annoying and intrusive for players.


Antivirus: Software designed to detect, prevent, and remove malicious software from a computer system. Antivirus programs are essential for protecting devices from various threats. Example: Popular antivirus programs like Window Defender, MalwareBytes, or Avast that scan for viruses and malware, helping to keep your system safe.

B

Backdoor: A hidden method for bypassing normal authentication in a computer system. Backdoors can be created by developers for legitimate reasons, but they can also be exploited by hackers. Example: A hacker installing a secret program that allows them to access a system without a password, compromising the security of the entire network.

Biometrics: The measurement and analysis of unique physical or behavioral characteristics for authentication purposes. Biometrics are increasingly used for secure access. Example: Using fingerprint or facial recognition to unlock your smartphone, providing a convenient yet secure way to access your device.


Botnet: A network of infected computers controlled by a malicious actor to perform coordinated tasks. Botnets can be used for various malicious activities, including sending spam or launching attacks. Example: Thousands of compromised IoT devices used to launch a DDoS attack, overwhelming a target's resources and causing disruption.

C

Cryptography: The practice of secure communication techniques that allow only the sender and intended recipient to view the message. Cryptography is vital for protecting sensitive information. Example: Using end-to-end encryption in messaging apps like Signal or WhatsApp, ensuring that only the intended recipients can read the messages exchanged.


Cybersecurity: The practice of protecting systems, networks, and programs from digital attacks. Cybersecurity encompasses a wide range of measures to safeguard data. Example: Implementing firewalls, antivirus software, and employee training to safeguard a company's data from potential threats and breaches.


D

DDoS (Distributed Denial of Service): An attack where multiple compromised systems flood a target's resources, making it unavailable to legitimate users. DDoS attacks can severely disrupt services. Example: Overwhelming a website with traffic from thousands of infected computers, causing it to crash and preventing users from accessing the site.


Data Breach: An incident where confidential or sensitive information is accessed or stolen by an unauthorized party. Data breaches can have serious consequences for individuals and organizations. Example: The 2017 Equifax breach that exposed personal data of 147 million people, leading to identity theft and financial loss for many.

E

Encryption: The process of converting information into a code to prevent unauthorized access. Encryption is a fundamental aspect of data security. Example: Using HTTPS to secure data transmitted between a web browser and a website, ensuring that sensitive information remains confidential during online transactions.


Exploit: A piece of software or sequence of commands that takes advantage of a vulnerability to gain unauthorized access or control. Exploits can be used by attackers to compromise systems. Example: Using a zero-day exploit to infiltrate a company's network before a patch is available, allowing the attacker to gain control before the vulnerability is addressed.

F

Firewall: A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. Firewalls are essential for protecting networks from unauthorized access. Example: A hardware firewall protecting a corporate network from external threats, ensuring that only legitimate traffic is allowed through.


Forensics: The application of scientific methods to collect, analyze, and present digital evidence. Example: Recovering deleted files from a hard drive to investigate cybercrime.


H

Hacker: An individual who uses computer skills to gain unauthorized access to systems or data. Hackers can have different motivations, ranging from malicious intent to ethical hacking. Example: A white hat hacker performing authorized penetration testing on a company's network, helping to identify vulnerabilities before they can be exploited by malicious actors.

Honeypot: A security mechanism designed to detect, deflect, or counteract attempts at unauthorized use of information systems. Honeypots serve as traps for attackers, allowing security teams to study their methods. Example: Setting up a fake server to lure and study attacker behavior, which can provide insights into the tactics used by cybercriminals.

I

Intrusion Detection System (IDS): A device or software application that monitors a network for malicious activities or policy violations. IDS can alert administrators to potential threats in real-time. Example: Snort, an open-source network intrusion detection system, which analyzes network traffic for suspicious patterns and alerts security personnel.

IoT (Internet of Things): The interconnected network of physical devices embedded with electronics, software, and network connectivity. IoT devices can enhance convenience but also pose security risks. Example: Smart home devices like thermostats, security cameras, and voice assistants that can be controlled remotely, but may also be vulnerable to hacking.


M

Malware: Software designed to disrupt, damage, or gain unauthorized access to a computer system. Malware can take many forms and can be devastating to individuals and organizations. Example: Viruses, worms, trojans, and ransomware are all types of malware that can compromise data integrity and security.

Multi-Factor Authentication (MFA): An authentication method that requires two or more independent ways to identify a user. MFA adds an extra layer of security to protect sensitive information. Example: Logging into an account using a password and a fingerprint scan, ensuring that even if a password is compromised, unauthorized access is still prevented.


P

Phishing: A technique for attempting to acquire sensitive data, such as passwords or credit card details, by masquerading as a trustworthy entity. Phishing attacks can be very convincing and often target unsuspecting users. Example: An email claiming to be from your bank, asking you to click a link and enter your login credentials, which can lead to identity theft if successful.


Protocol: A set of rules or procedures for transmitting data between electronic devices. Protocols ensure that data is sent and received correctly. Example: HTTPS, SSH, and FTP are all examples of network protocols that govern how data is securely transmitted over the internet.


R

Ransomware: A type of malicious software designed to block access to a computer system until a sum of money is paid. Ransomware attacks can be devastating for individuals and organizations alike. Example: The WannaCry ransomware attack that affected over 200,000 computers across 150 countries in 2017, causing widespread disruption and financial loss.

Router: A networking device that forwards data packets between computer networks. Routers are essential for connecting devices to the internet. Example: A home Wi-Fi router that connects multiple devices to the internet, allowing users to browse, stream, and communicate online.


S

Social Engineering: The psychological manipulation of people into performing actions or divulging confidential information. Social engineering exploits human psychology rather than technical vulnerabilities. Example: A scammer posing as IT support to trick an employee into revealing their password, which can lead to unauthorized access to sensitive systems.

SSL/TLS (Secure Sockets Layer/Transport Layer Security): Cryptographic protocols designed to provide communications security over a computer network. These protocols are essential for protecting data in transit. Example: The padlock icon in your browser's address bar indicates a secure HTTPS connection, which ensures that data exchanged between your browser and a website is encrypted and secure.


Smishing: type of cyber attack that uses text messages to trick you into giving away sensitive information or downloading malware. It's like phishing, but through SMS (text messages) instead of email. Example: "Bank alert: Your account has been locked. Call this number immediately: [fake phone number]"



V

VPN (Virtual Private Network): A service that allows users to create a secure, encrypted connection to another network over the Internet. This technology is particularly useful for maintaining privacy and security while online. Example: Using a VPN to access region-restricted content or protect your data on public Wi-Fi, ensuring that your online activities remain private and secure from prying eyes.

Virus: A type of malicious code or program written to alter the way a computer operates and designed to spread from one computer to another. Viruses can cause significant damage to systems and data. Example: The ILOVEYOU virus that spread via email attachments in 2000, causing billions in damages and affecting millions of computers worldwide.



Vishing: short for voice phishing, is a deceptive practice where scammers use phone calls or voice messages to trick individuals into revealing sensitive information. Example: Sarah receives a call from what appears to be her bank's fraud department. The caller claims there's been suspicious activity on her account and asks her to verify her identity by providing her account number and password. Feeling worried, Sarah complies, unknowingly giving the scammer access to her bank account.

W

Worm: A standalone malware computer program that replicates itself to spread to other computers. Unlike viruses, worms do not require a host file to spread. Example: The Stuxnet worm that targeted industrial control systems in Iran's nuclear facilities, demonstrating the potential for worms to cause real-world damage.


Wi-Fi: A technology for wireless local area networking with devices based on the IEEE 802.11 standards. Wi-Fi allows devices to connect to the internet without physical cables. Example: Connecting your laptop to a coffee shop's free Wi-Fi network, enabling you to browse the web and stay connected while on the go.


Z

Zero-Day Exploit: An attack that occurs on the same day a weakness is discovered in software. These exploits are particularly dangerous because they can be used before developers have a chance to fix the vulnerability. Example: Hackers exploiting a newly discovered vulnerability in a popular web browser before the developers can patch it, putting countless users at risk.


ree

 
 
 

Comments


bottom of page