Cybersecurity
Glossary
-
Access Control: Restricting access to resources based on user identity, role, or privileges.
-
Adaptive Email Attack: adaptive email hacks involve continuous learning and adaptation based on the interaction with the target.
-
Algorithm: A set of instructions for encrypting, decrypting, or processing data.
-
Anti-Virus (AV): Software that detects and removes malware.
-
APT - Advanced Persistent Threat - Complex Hacking Campaign with Multiple Layers and Methods to Accomplish the Goal.
-
Authentication: Verifying user identities through passwords, biometrics, or tokens.
-
Authorization: Granting access to resources based on user privileges.
-
Availability Threat: An attack on a system or network that disrupts access to those systems.
-
Backdoor: A secret entry point in software or hardware for unauthorized access.
-
Botnet: A network of compromised devices for distributed attacks.
-
Blue Team: Refers to the group of cybersecurity professionals within an organization responsible for defending against cyber attacks.
-
Brute Force Attack: Guessing passwords or encryption keys through exhaustive attempts.
-
Buffer Overflow: Exploiting software vulnerabilities by overflowing data buffers.
-
BYOD (Bring Your Own Device): Allowing personal devices for work or access to organizational resources.
-
Cloud Security: Protecting data and applications in cloud-based environments.
-
Cryptography: Techniques for secure data transmission and encryption.
-
Confidentiality Threat: actual event that jeopardizes the privacy and secrecy of sensitive information, leading to unauthorized access, or disclosure.
-
Cyber Attack: Any malicious activity targeting computer systems or networks.
-
Cybersecurity: Practices and technologies for protecting digital assets.
-
Data Breach: Unauthorized access or theft of sensitive information.
-
Data Encryption: Converting data into a secure, unreadable format.
-
Data Loss Prevention (DLP): Monitoring and controlling data movement and access.
-
Deep Fake: refers to synthetic media—typically images, videos, or audio—generated or altered using artificial intelligence & machine learning;
-
Denial of Service (DoS): Overwhelming systems with traffic to make them unavailable.
-
Digital Signature: Verifying authenticity and integrity of digital messages or documents.
-
Disaster Recovery: Restoring systems and data after a disaster or outage.
-
Distributed Denial of Service (DDoS): Large-scale DoS attacks from multiple sources.
-
DNS (Domain Name System): Translating domain names to IP addresses.
-
Encryption: Converting data into a secure, unreadable format.
-
Endpoint Security: Protecting individual devices and endpoints from threats.
-
Ethical Hacking: Simulating cyber attacks to test defenses and identify vulnerabilities.
-
Exploit: Taking advantage of software or hardware vulnerabilities.
-
Firewall: Network device or software blocking unauthorized access.
-
GenAI Governance: Framework of policies, processes, and controls established to ensure the responsible development, deployment, and use of AI.
-
GDPR (General Data Protection Regulation): EU regulation for personal data protection.
-
Hacking: Unauthorized access or malicious activity on computer systems.
-
Hash Function: Generating a digital fingerprint for data authentication.
-
Heuristic Attack: approach in hacking often involve trial and error, pattern recognition, and leveraging known weaknesses in systems to gain entry.
-
Identity and Access Management (IAM): Managing user identities and access.
-
Incident Response: Responding to and managing cybersecurity incidents.
-
Insider Threat: Threats to security from within an organization.
-
Integrity Threat: Potential or actual event that compromises the accuracy, consistency, and trustworthiness of data or information.
-
Intellectual Property (IP): Legal rights to creations and innovations.
-
Internet of Things (IoT): Network of physical devices with internet connectivity.
-
Intrusion Detection System (IDS): Monitoring network traffic for signs of unauthorized access.
-
Intrusion Prevention System (IPS): Blocking suspicious network traffic.
-
Keylogger: Software or hardware capturing keystrokes.
-
Malware: Software designed to harm or exploit systems.
-
Man-in-the-Middle (MitM): Intercepting communication between two parties.
-
Network Security: Protecting network infrastructure and traffic.
-
Next-Generation Firewall (NGFW): Advanced firewall with additional features.
-
NIST (National Institute of Standards and Technology): US organization for technology standards.
-
Password Cracking: Guessing or decrypting passwords.
-
Patch Management: Updating software with security patches.
-
Penetration Testing: Simulating cyber attacks to test defenses.
-
Phishing: Tricking users into revealing sensitive information.
-
Privilege Escalation: Exploiting vulnerabilities to gain higher privileges.
-
Ransomware: Malware demanding payment in exchange for data restoration.
-
Remote Access: Accessing systems or networks from a remote location.
-
Risk Management: Identifying and mitigating potential security risks.
-
Rootkit: Software hiding malware or unauthorized access.
-
Secure Sockets Layer (SSL): Encrypting data in transit.
-
Security Information and Event Management (SIEM): Monitoring and analyzing security-related data.
-
Security Operations Center (SOC): Centralized security monitoring and incident response.
-
Social Engineering: Manipulating individuals into revealing sensitive information.
-
Spyware: Software secretly monitoring user activity.
-
SQL Injection: Injecting malicious code into databases.
-
Threat Intelligence: Gathering and analyzing threat data for improved security.
-
Trojan Horse: Malicious software disguised as legitimate software.
-
Two-Factor Authentication (2FA): Verifying identities with two forms of authentication.
-
Vulnerability: Weaknesses in software or hardware that can be exploited.
-
Web Application Firewall (WAF): Protecting web applications from attacks.
-
Worm: A type of malicious software program that replicates itself to spread to other computers.
-
Zero-Day Exploit: Attacking previously unknown vulnerabilities.
-
Two-Factor Authentication (2FA): Verifying identities with two forms of authentication.
-
Vulnerability: Weaknesses in software or hardware that can be exploited.
Cybersecurity by the Numbers
Cyber Attacks
2023 in Million
317
Threat Protection
200+
Avg Cost in Cyber Attack
9.4M
Attacks Per Day
2400