Glossary

This glossary provides essential cybersecurity terminology and definitions to help you grasp key concepts in the field.

A

Access Control - Security techniques that regulate who or what can view or use resources in a computing environment.

Advanced Persistent Threat (APT) - A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.

Authentication - The process of verifying the identity of a user, device, or system before granting access.

Authorization - The process of granting or denying specific permissions to a user, system, or process.


B

Backdoor - A hidden method of bypassing normal authentication to gain unauthorized access to a system.

Botnet - A network of compromised computers controlled remotely by an attacker, often used for DDoS attacks.

Brute Force Attack - A method of guessing passwords or encryption keys by systematically trying all possible combinations.


C

Certificate Authority (CA) - An entity that issues digital certificates to verify identities on the internet.

Cloud Security - Measures and policies used to protect data, applications, and services stored in cloud environments.

Cryptography - The practice of securing communication by converting information into an unreadable format for unauthorized users.


D

Data Breach - An incident in which sensitive or protected data is accessed, disclosed, or stolen by an unauthorized individual.

Denial-of-Service (DoS) Attack - An attack that disrupts normal traffic to a targeted server, service, or network by overwhelming it with traffic.

Domain Name System (DNS) Spoofing - A cyberattack in which attackers manipulate DNS records to redirect users to fraudulent websites.


E

Endpoint Security - Measures taken to secure endpoints (computers, mobile devices, etc.) from cyber threats.

Encryption - The process of converting plaintext into ciphertext to prevent unauthorized access.

Ethical Hacking - The practice of testing an organization’s security by attempting to exploit vulnerabilities, legally and with permission.


F

Firewall - A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.

Forensics (Cybersecurity Forensics) - The investigation of cyberattacks and security incidents to gather evidence and determine causes.


G

Gray Hat Hacker - A hacker who may violate ethical norms or laws but does not have malicious intent.

Governance, Risk, and Compliance (GRC) - A strategy for managing an organization's overall governance, enterprise risk management, and regulatory compliance.


H

Honeypot - A security mechanism that acts as a decoy to attract and detect cyberattacks.

Hashing - A process that converts input data into a fixed-length string, typically used for verifying data integrity.


I

Incident Response - The process of identifying, managing, and mitigating security incidents to minimize damage.

Intrusion Detection System (IDS) - A security tool that monitors network traffic for suspicious activity and threats.

Insider Threat - A security risk posed by individuals within an organization who have access to sensitive data.


J

Juice Jacking - A type of cyberattack where a malicious charging station steals data or installs malware onto a connected device.


K

Keylogger - A type of malware that records keystrokes to capture sensitive information like passwords and credit card numbers.


L

Least Privilege Principle - A security principle that restricts users to the minimum level of access required to perform their tasks.

Logic Bomb - Malicious code inserted into a system that triggers harmful actions under certain conditions.


M

Malware - Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.

Man-in-the-Middle (MitM) Attack - A cyberattack where an attacker intercepts and alters communications between two parties without their knowledge.

Multi-Factor Authentication (MFA) - A security process that requires multiple forms of verification (e.g., password and fingerprint) to access a system.


N

Network Security - Measures taken to protect the integrity, confidentiality, and availability of computer networks.

Nonce - A random or unique number used once in a cryptographic process to prevent replay attacks.


O

Open-Source Intelligence (OSINT) - The collection and analysis of publicly available information for cybersecurity or intelligence purposes.

OAuth (Open Authorization) - A protocol that allows third-party applications to securely access a user’s information without sharing passwords.


P

Phishing - A type of cyberattack where attackers impersonate legitimate entities to trick individuals into providing sensitive information.

Patch Management - The process of updating software and systems to fix security vulnerabilities.

Public Key Infrastructure (PKI) - A framework for managing digital certificates and encryption keys to secure communications.


Q

Quantum Cryptography - A field of cryptography that uses quantum mechanics to enhance security.


R

Ransomware - A type of malware that encrypts a victim’s data and demands a ransom for its decryption.

Risk Assessment - The process of identifying, evaluating, and prioritizing cybersecurity risks.


S

Social Engineering - A technique used by attackers to manipulate people into divulging confidential information.

Security Information and Event Management (SIEM) - A system that aggregates and analyzes security data from multiple sources.

Software Vulnerability - A flaw in software that can be exploited by attackers.


T

Trojan Horse - A type of malware disguised as legitimate software that can perform malicious actions.

Two-Factor Authentication (2FA) - A security process requiring two separate authentication methods for access.

Threat Intelligence - The collection and analysis of information to identify and mitigate cybersecurity threats.


U

Unauthorized Access - Access to a system or data without proper authorization.

URL Spoofing - A cyberattack where a fake website is created to resemble a legitimate one and deceive users.


V

Virtual Private Network (VPN) - A secure tunnel that encrypts internet traffic and hides a user’s IP address.

Virus - A type of malware that replicates itself and spreads to other files or programs.

Vulnerability Assessment - The process of identifying and evaluating security weaknesses in a system.


W

Worm - A type of malware that replicates itself and spreads across networks without user intervention.

Whitelisting - A security measure that only allows pre-approved applications or users to access a system.


X

XSS (Cross-Site Scripting) - A web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by users.


Y

Yara Rules - A tool used by cybersecurity professionals to identify and classify malware.


Z

Zero-Day Exploit - An attack that targets a previously unknown vulnerability before a fix is available.

Zero Trust Architecture - A security model that requires strict identity verification for all users and devices, regardless of location.





Last modified: Tuesday, 18 February 2025, 10:34 PM