Glossary
This glossary provides essential cybersecurity terminology and definitions to help you grasp key concepts in the field.
A
Access Control - Security techniques that regulate who or what can view or use resources in a computing environment.
Advanced Persistent Threat (APT) - A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
Authentication - The process of verifying the identity of a user, device, or system before granting access.
Authorization - The process of granting or denying specific permissions to a user, system, or process.
B
Backdoor - A hidden method of bypassing normal authentication to gain unauthorized access to a system.
Botnet - A network of compromised computers controlled remotely by an attacker, often used for DDoS attacks.
Brute Force Attack - A method of guessing passwords or encryption keys by systematically trying all possible combinations.
C
Certificate Authority (CA) - An entity that issues digital certificates to verify identities on the internet.
Cloud Security - Measures and policies used to protect data, applications, and services stored in cloud environments.
Cryptography - The practice of securing communication by converting information into an unreadable format for unauthorized users.
D
Data Breach - An incident in which sensitive or protected data is accessed, disclosed, or stolen by an unauthorized individual.
Denial-of-Service (DoS) Attack - An attack that disrupts normal traffic to a targeted server, service, or network by overwhelming it with traffic.
Domain Name System (DNS) Spoofing - A cyberattack in which attackers manipulate DNS records to redirect users to fraudulent websites.
E
Endpoint Security - Measures taken to secure endpoints (computers, mobile devices, etc.) from cyber threats.
Encryption - The process of converting plaintext into ciphertext to prevent unauthorized access.
Ethical Hacking - The practice of testing an organization’s security by attempting to exploit vulnerabilities, legally and with permission.
F
Firewall - A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.
Forensics (Cybersecurity Forensics) - The investigation of cyberattacks and security incidents to gather evidence and determine causes.
G
Gray Hat Hacker - A hacker who may violate ethical norms or laws but does not have malicious intent.
Governance, Risk, and Compliance (GRC) - A strategy for managing an organization's overall governance, enterprise risk management, and regulatory compliance.
H
Honeypot - A security mechanism that acts as a decoy to attract and detect cyberattacks.
Hashing - A process that converts input data into a fixed-length string, typically used for verifying data integrity.
I
Incident Response - The process of identifying, managing, and mitigating security incidents to minimize damage.
Intrusion Detection System (IDS) - A security tool that monitors network traffic for suspicious activity and threats.
Insider Threat - A security risk posed by individuals within an organization who have access to sensitive data.
J
Juice Jacking - A type of cyberattack where a malicious charging station steals data or installs malware onto a connected device.
K
Keylogger - A type of malware that records keystrokes to capture sensitive information like passwords and credit card numbers.
L
Least Privilege Principle - A security principle that restricts users to the minimum level of access required to perform their tasks.
Logic Bomb - Malicious code inserted into a system that triggers harmful actions under certain conditions.
M
Malware - Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
Man-in-the-Middle (MitM) Attack - A cyberattack where an attacker intercepts and alters communications between two parties without their knowledge.
Multi-Factor Authentication (MFA) - A security process that requires multiple forms of verification (e.g., password and fingerprint) to access a system.
N
Network Security - Measures taken to protect the integrity, confidentiality, and availability of computer networks.
Nonce - A random or unique number used once in a cryptographic process to prevent replay attacks.
O
Open-Source Intelligence (OSINT) - The collection and analysis of publicly available information for cybersecurity or intelligence purposes.
OAuth (Open Authorization) - A protocol that allows third-party applications to securely access a user’s information without sharing passwords.
P
Phishing - A type of cyberattack where attackers impersonate legitimate entities to trick individuals into providing sensitive information.
Patch Management - The process of updating software and systems to fix security vulnerabilities.
Public Key Infrastructure (PKI) - A framework for managing digital certificates and encryption keys to secure communications.
Q
Quantum Cryptography - A field of cryptography that uses quantum mechanics to enhance security.
R
Ransomware - A type of malware that encrypts a victim’s data and demands a ransom for its decryption.
Risk Assessment - The process of identifying, evaluating, and prioritizing cybersecurity risks.
S
Social Engineering - A technique used by attackers to manipulate people into divulging confidential information.
Security Information and Event Management (SIEM) - A system that aggregates and analyzes security data from multiple sources.
Software Vulnerability - A flaw in software that can be exploited by attackers.
T
Trojan Horse - A type of malware disguised as legitimate software that can perform malicious actions.
Two-Factor Authentication (2FA) - A security process requiring two separate authentication methods for access.
Threat Intelligence - The collection and analysis of information to identify and mitigate cybersecurity threats.
U
Unauthorized Access - Access to a system or data without proper authorization.
URL Spoofing - A cyberattack where a fake website is created to resemble a legitimate one and deceive users.
V
Virtual Private Network (VPN) - A secure tunnel that encrypts internet traffic and hides a user’s IP address.
Virus - A type of malware that replicates itself and spreads to other files or programs.
Vulnerability Assessment - The process of identifying and evaluating security weaknesses in a system.
W
Worm - A type of malware that replicates itself and spreads across networks without user intervention.
Whitelisting - A security measure that only allows pre-approved applications or users to access a system.
X
XSS (Cross-Site Scripting) - A web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by users.
Y
Yara Rules - A tool used by cybersecurity professionals to identify and classify malware.
Z
Zero-Day Exploit - An attack that targets a previously unknown vulnerability before a fix is available.
Zero Trust Architecture - A security model that requires strict identity verification for all users and devices, regardless of location.
