An A-Z repository of Cyber Security Terminology.
Anti-Virus Software
A computer program used to prevent, detect, and remove malware.
Backdoor
A “hidden” method of bypassing security to gain access to a restricted part of a computer system.
BAU
The normal execution of operations within an organisation.
Botnet
A collection of internet-connected devices, which may include PCs, servers and mobile devices that are infected and controlled
Cookie
These are small files stored on your computer. They provide the website with a way to manage your preferences and recognise you.
Cloud, The
Using a network of remote servers hosted on the Internet to store, manage, and process data, rather than on-premise solutions.
Dark Web
The dark web is a part of the internet that isn’t indexed by search engines. This means you will not find it by Googling. You must use a “special” browser called TOR (The Onion Router).
Data Breach
A data breach is the intentional or unintentional release of secure or private/confidential information to an un-trusted environment.
Deep Web
The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard web search-engines.
Digital Footprint
The trail of data you create while using the Internet, which can be seen by most people.
DoS / DDoS
A DDoS or DoS is an acronym of Distributed Denial of Service. This is an attack that targets a network/service/server and tries to overwhelm it to the point that it disrupts normal traffic.
Exploit
To take advantage of a vulnerability for malicious intent/purpose.
Firewall
This is a piece of software and or hardware that stops unauthorised access/attempts. For example, blocks a web page from being accessible.
Hacker/Hacking
Someone who attempts to break into a computer or network. Hacking is the action of the hacker.
IoT
Abbreviated from Internet of Things, refers to all physical devices around the world that are connected to the internet.
IP Address
An IP address is a number that identifies a piece of hardware. The IP address allows you to communicate with other networks and devices.
IR
Incident Response
Keylogger
This is a piece of software that captures keystrokes on a computer and then sends them back to the hacker via the Internet.
Malware
Derived from the two words Malicious and Software, it is designed to cause damage to a computer or network.
MFA/2FA
This is a common abbreviation for Multi-Factor Authentication or 2 Factor Authentication. This is a security measure whereby you must authenticate two different methods after your password.
It usually consists of 2 of the below:
– Something you have (Keycard/App/Token),
– Something you know (Password),
– Something you are (Biometrics).
Nation State
Someone who has a “license to hack”. The actor works for the government and are used to hack a target in order to gain intelligence and or data.
NOC
A Network Operations Center is a centralised location where analysts can monitor a network and maintain it.
OSINT
Open Source Intelligence is collecting data from publicly available sources.
Patch/Patching
Applying changes to a computer/network in order to update, fix or improve it. Typically to seal a vulnerability.
Penetration Testing
More commonly known as “pen testing”, it is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
Phishing
A method of trying to gather personal information using deceptive e-mails and websites.
Ransomware
A type of malware designed to block access to a system until a money fee is paid. It works by encrypting all data and rendering it unusable.
Risk
An overlap of Threats and Vulnerabilities whereby there is a potential for loss, damage or destruction of an asset.
Router
A device that allows communication on a network. Typically what you would find in your home in order to connect to WiFi / Internet.
Scam/Scammer
Something/Someone that attempts fraudulent activities in order to take money or goods from an unsuspecting person.
SOC
Security Operations Center, a centralised unit that deals with security issues on an organisational and technical level.
Social Engineering
The art of manipulating people in order to gain their information which is usually used against them.
Spam
Typically known as junk email.
Spear-Phishing
A form of phishing that targets a specific user in an attempt to get information from them.
Spoofing
When someone or something imitates something else in an attempt to gain confidence, access, steal or infiltrate further. A common one of this is with emails pretending, for example; where it looks like the email is from the CEO but it’s not.
Spyware
Software that secretly records what you do on your computer.
SSL/TLS
Transport Layer Security is the successor of Secure Sockets Layer whereby they are protocols designed to provide security to communications over a computer network. Look for the padlock or HTTPs in your browser!
Surface Web
The “normal” Internet that you use and is accessible to everyone using the internet.
Threat
Something that can exploit a vulnerability, with a motive such as obtain information, damage or deface an organisation and their reputation.
Threat Actor
Someone that may want to cause harm or intent. Types include, spyware, malware, ransomware, adware, keylogger, nation state etc.
Trojan
Sometimes known as a Trojan Horse. This is a software that is designed to look like something legitimate in order to gain access to the system. It comes from the Greeks when they tried to enter the independent city of Troy to win the war.
Virus
Malware that is on a computer/network performing malicious activity.
VPN
A Virtual Private Network is software that gives you added privacy to your online identity by creating a private network from a public one. The VPN masks your IP address and making your online actions near impossible to trace.
Vulnerability
A weakness that can be exploited by a threat actor to gain unauthorised access.
Whaling
Similar to spear-phishing whereby it targets a specific user, whaling comes from the term of going for the big fish, the prize winner. Whaling will target the high profile users within an organisation such as managers, directors, executives.
Worm
Malware that replicates itself within the network so it can spread to other areas and infect them.
Zero-Day
This is a vulnerability that is not yet known – typically when it is first created and undetected but affecting devices/networks.
All feedback is welcomed and I hope to hear from you. If you have any questions or concerns, please do reach out to me. This list will continue to grow.
Dan.