As cyber threats continue to arise, it is essential for each individual to consistently enhance their understanding of cybersecurity measures to safeguard their privacy, digital footprints, endpoints, and other crucial infrastructures.
A practical approach to achieving this is familiarizing oneself with technical terms, also known as a "Cybersecurity Glossary."
I have compiled a comprehensive list of these terms from A to Z in this section to assist you in this endeavor.
Also known as Admin Privilege or Privileged User Account, this is permission granted to a user to have unique access to a system and be able to make changes to the operating system or software program. It requires the user to input a password for authentication to make authorized changes.
Advanced Persistent Threat
This happens when an unauthorized user, such as a hacker, gains access to a computer network and remains unnoticed or undetected for an extended period. The threat actor stays unnoticed by configuring the attacks not to cause damage to the network but to steal data from it.
Known as Advertising Software, adware displays and/or downloads unwanted and unauthorized advertisements and information in the form of pop-ups on the screen. It slows down the device and installs viruses on it.
Also called an attack path, it is the method used by hackers to illegally gain access to a computer or network and exploit it.
Confirming a user's identity before granting access to a device or network.
A security goal that guarantees that users have access to information thoroughly and efficiently without delay.
A method of gaining high-level user access to a program, network, service, or computer system without going through the standard authentication process of either authorized or unauthorized users.
A copy of a system or network's files and programs for data recovery in the case of data due to a cyber-attack or accidental deletion.
Black hat hacking
A hacker exploits a computer or network to steal data or spread a virus.
A robot is programmed to carry out a simple task without the supervision of a human.
An army of bots. See Bots.
Any security event that leads to unauthorized access to a network, data, devices, or applications.
Brute force attack
This occurs when a hacker tries to log into a platform by making several guesses and inputting login credentials.
A computer program or system coding error can cause unexpected results or a system crash.
Fully known as Bring Your Own Device, it is an IT policy that allows the individual use of personal devices to access the organization's network instead of the organization's formal devices.
Known as a challenge-response authentication, this is a test used to confirm that a user is not a robot. It might ask a user to input a displayed text to identify some images.
Data or information in an encrypted form are ciphertext and cannot be read until they are converted to plain text.
Also known as a UI redress attack, this is a method used by a system attacker to trick and redirect users to another webpage entirely after clicking on a particular webpage link.
Unlike open-source or public software, closed-source refers to proprietary software with hidden code from general public access. So, it cannot be seen, modified, or used.
Cloud access security brokers, or CASBs, are cloud-based software solutions between a business/use and cloud service provider to monitor all activities and enforce security, compliance, and governance policies.
The technology delivers internet services such as data storage, servers, databases, networking, and software. It is of 3 main types: public, private, and hybrid clouds.
This involves strategies, methods, technologies, and policies to protect data and/or cloud system applications from cyber-attacks/threats. It differs based on the types of cloud computing.
Confidentiality ensures that data are shared only with authorized users on a computer system/network by restricting information access and preventing disclosure of data to unauthorized users. It can be done by multi-factor authentication, strong password, encryption of data, etc.
It is a cyberattack technique used by hackers to present a fake and fraudulent site to a computer user as if it is a legitimate and trustworthy site and lure the user to visit it. Spoofing attacks differ from phishing attacks because they don’t seek to retrieve or request user data. Instead, they distribute or deliver malicious software.
Cookies are data of a user's IP address, passwords, page views, username, browsing history, etc., generated by a web server during web sessions. They were initially used to help users stay logged in but have become a common way for websites to identify and track visitors’ activity.
They are harmless. However, cyberattacks can hijack data since they track passwords and browsing history.
This is a technique, strategy, and set of policies that are put in place to protect computers, cloud system applications, networks, programs, and data from information disclosure, theft, hardware or software damage, data loss, unauthorized access, cyber attack, or cyberattacks.
Also known as data leakage, data theft, or exfiltration. A data breach is an incident that discloses sensitive or confidential information or moves this information to an unauthorized and often external party without permission.
Distributed Denial of Service (DDoS) Attacks
DDoS attacks use multiple devices or hosts from multiple locations to launch a DoS attack on a computer system or network.
Denial of Service (DoS)
DoS is a cyberattack to shut down a computer system or network by sending information that can trigger a crash. This disrupts services by making the system/network inaccessible for authorized users. It often requires a financial cost to regain access.
This comes as media content (image, audio, video) designed to look like legitimate content. In the form of an audio/video, it can be used by a user to sound like another user.
The process of preserving email communications in a way that they can be searched or restored.
It is a cyberattack used with phishing emails to trick users into believing an email is from a trusted or known source. This email usually contains malicious codes.
It consists of malicious codes delivered to users via email messages and attachments to infect and attack a computer.
Encrypted Cloud Backup
It works just like cloud storage systems such as Google Drive or Dropbox to store and manages data within a cloud. However, an encryption key is required to gain access to those backup data.
Converting or changing plaintext into ciphertext ensures that sensitive data are secured from possible theft.
It is a legal and authorized hacking done by gaining unauthorized access to computers and information systems to expose vulnerabilities, weaknesses, and potential security risks within computers and information systems that attackers can exploit and resolve before possible threats/cyber attacks.
This is an attack on a computer network done by exploiting the network's vulnerability.
It used legitimate tools on the computer to attack a computer, thus, making the computer act against itself. It is usually undetected as it exists on the computer's RAM. Unlike other malware, it doesn't require a file, download, or code from a cyber attacker. Hence it leaves no footprint.
A firewall is a computer and network security system that monitors and filters incoming and outgoing network traffic. It guards the traffic at computers’ entry points, called ports, and it does this based on the security policies and rules of the organization. It can exist as software and hardware, and it is trusted as the first line of defense of the computer system and network against cyber attacks.
Code or software embedded into computer hardware, such as the motherboard, to prevent phishing, data modification, business email compromise, or data corruption.
Malware captures sensitive information such as names, passwords, financial data, etc., provided by users on web forms.
GDPR or General Data Protection Regulation
All countries share the most challenging data privacy and security legal framework in the European Union (EU). It sets the guidelines for the transmission, storage, and use of personal data of users who are based in the EU. If your company has European users, the GDPR applies to your business. Your business is made responsible for processing individual data and asked to take ‘appropriate’ measures when needed.
A cyber attacker or unauthorized user who attempts to gain access to computer systems or networks to steal sensitive data and information and to spread viruses or disguises to carry out fraudulent activities and financial transactions.
Any part of a computer that can be seen and touched, such as its monitor, keyboard, screen, Central Processing Unit, etc., is known as hardware.
Produces from an algorithm that performs on data, a hash is used to verify that data is not modified, tampered with, or corrupted.
This process confirms the person behind a process to prevent unauthorized users and activities.
This is a crime in which a cyberattacker collects personal and highly sensitive data to impersonate another individual to use it for fraudulent activities and financial transactions.
This is how organizations handle attacks/unauthorized actions on their computer network or system.
Information Technology (IT)
IT uses interconnected devices to process, send, receive, or exchange data or information.
An insider threat is a malicious threat posed by an individual within an organization who has access to the organization's data and computer systems. It can be caused by the individual's harmful intention or negligence.
Internet Protocol Address is a set of numerical values that gives information about a computer network user's physical location.
One of the best programming languages for cybersecurity. It is used to design, secure, and improve the functionality of websites.
A computer operating system's central or core part manages all the processes, memory, files, etc.
A keylogger is a computer program that monitors and records everything users do on the keyboard. It is one of the methods hackers can use to steal your password.
Local Area Network or LAN
A wired or wireless group of computer networks that share a standard network for communication purposes within a defined geographical area. It can be found in homes, offices, or other shared workspaces. More devices on a network increase the risk of unauthorized entry.
Coined from Malicious Software, it is delivered to a user to cause damage or gain unauthorized access to computer systems and information.
This kind of data provides information about other data or files and their characteristics, such as the author, date of creation, file size, storage location, and the “Date Last Opened” information.
It is software that can be installed to minimize the damage caused by cyber-attacks.
It is the privilege or permission given to a user to access a company’s shared network to allow the transmission, storage, and securing of information seamlessly.
Any tool, activity, program, and policy put in place to protect an organization’s network, such as its hardware, software, data, communication system, or physical or virtual infrastructure.
National Security Agency or NSA
The NSA is the official United States cryptology organization in the Department of Justice responsible for maintaining foreign and domestic intelligence by monitoring, collecting, and processing information and data on a global scale.
It is a copy of all your company’s data in a cloud system or other physical storage location where it can be accessed in case you lose your records.
Called initially Open Source Software (OSS), it is an open-source code for many users to view, modify, share, and use.
The method of securing passwords such as password encryption. It also helps to make passwords readily available between team members so that sensitive information is shared safely.
A strategy was established to ensure upgraded and updated software and network devices, thus reducing the risk of low-level virus infestation.
This test is performed on a computer system to check for possible vulnerabilities to be exploited to attack the system.
This occurs when a user is redirected to a fake website without realizing it. Pharming is often undetected because the change to the original website URL is not always noticeable.
This is a social engineering attack usually done with emails disguised as coming from a legitimate source. It is launched at a system/network to steal information.
These programs allow another user to tag along with an authorized user to gain entry into a restricted area or pass a particular checkpoint.
Personal Identifiable Information is any data that can be used to identify the person, such as their name, email, date of birth, phone number, etc.
They customizable additions to browsers or software to add extra functionality. Make sure to vet the program before installing it.
The superbug in technology. It is a malicious program that can infect complex files and modify itself when replicating.
This is the protection of a computer system/network against unauthorized access.
Also known as PII, it includes your name, address, phone number, email, zip code, or Social Security Number.
A network worm with backdoor capabilities.
Quality of Protection
Your network can maintain operational service delivery during an attack.
Malware that prevents users from accessing their computer until they pay their ransom to the attacker to grant them access.
RAT (Remote Access Trojans)
Malware allows hackers unlimited access to a computer system or network from a backdoor or separate physical location.
A CAPTCHA service from Google proves that a user is not a robot and protects websites from spam and fake traffic caused by bots. It involves inputting displayed text or clicking on required images to prove a user is human.
It is malicious software an unauthorized user uses to gain continuous access and maintain commands to the system/network without the knowledge of the original owner or user.
This security strategy executes unsafe codes without affecting the computer system or network.
A script is a simple form of code that can be written in plain text within Word editors to automate computer processes and functions.
Secure Password Encryption
This is a process of converting or changing a password’s plaintext into a ciphertext for security reasons.
This is an attack where a hacker hijacks a user’s sessions, impersonating them to carry out actions on the web. This can be achieved using several methods, such as brute force attacks and malware.
This method manipulates computer systems' users to divulge sensitive data.
Softwares are programs, and other operating systems computers use to carry out different functions. It can be installed online or via storage devices. Unlike hardware, software is not tangible.
Unsolicited emails sent in bulk which can be used to spread viruses and collect sensitive information from the receiver are called spam.
An attack in which a person or program forges data to gain an advantage or trust of someone else by appearing to be who he/she is not.
It slightly infiltrates a device or network to obtain important data and send it to a third party.
It is an abbreviation for Secure Sockets Layer certificate. This certificate authenticates the identity of a website and encrypts the information sent to the server to ensure security. It keeps data secured between web servers.
A trialware is a kind of software that can be accessed only for a limited amount of time (i.e., trial) before it expires.
It is a form of malware that appears harmless but is designed to provide hackers with the ability to launch attacks on a computer system to steal information, disrupt functionality, or damage data.
Unauthorized access is when someone enters a computer system, network, software, or data without permission.
This method makes a fake link look legitimate from a trusted source to lure a victim into clicking on it. It puts the user's data and device at risk of theft or malware infestation.
Virtual Private Network
Commonly referred to as VPN, it allows you to establish a secure and encrypted connection to a network. It prevents the transmission of sensitive data and tracking of online activity.
A virus is a malicious and self-replicating program that could be attached to files and other downloads. Its various types can spread within a system, causing data corruption and system damage. A virus spreads by copying itself and attaching it to other files.
A vulnerability is a flaw in a computer system that hackers can exploit to spread viruses or steal data.
Known as CEO fraud, this attack is launched at executives and individuals to trick them into approving financial transactions or divulging sensitive information.
White hat hacking
Ethical hacking exploits a system to check for security flaws and allow for improvement to strengthen the system's security.
A type of malware and a precursor to viruses capable of self-replicating and spreading across the network, causing damage to unprotected devices, is called a worm.
Also called transmit, it is the method of sending data to an alternate computer or device.
An abbreviation for the Year 2000 or Year 2000 bug.
Y2K was commonly used to refer to a widespread computer programming shortcut predicted to cause extensive havoc as the year changed from 1999 to 2000, as computer programs were storing year values as two-digit figures (i.e., 99 for 1999) instead of four-digit figures.
This represents security vulnerabilities that hackers can use to penetrate a computer network or system and launch a cyberattack to steal data or perform illegal activities.
An attack happens when hackers use the zero-day vulnerability to commit cybercrimes before fixing the error.
A bug that exists in a system and that is unknown to the developers who launched or created it. It grants access to hackers to carry out Zero-day Exploits.
As far as cybersecurity is concerned, there can never be too much knowledge of the subject matter. You must update yourself about emerging threats and cybersecurity measures to curtail them. That way, you will be better positioned to stay ahead of the curve.