Cybersecurity Terminology
Understand key cybersecurity concepts, explained simply and clearly.
A
Antivirus
Software designed to detect, prevent, and remove malware.
Authentication
The process of verifying the identity of a user, system, or entity.
B
Botnet
A network of computers infected with malware and controlled as a group.
Brute Force Attack
A trial-and-error method used to decode encrypted data.
C
Cryptography
The practice of securing information by transforming it into unreadable formats.
Cross-Site Scripting (XSS)
An attack that injects malicious scripts into web pages viewed by users.
D
Denial of Service (DoS)
An attack meant to shut down a machine or network by overwhelming it.
Data Breach
An incident where confidential information is accessed without authorization.
E
Encryption
The process of converting data into code to prevent unauthorized access.
F
Firewall
A security system that monitors and controls incoming and outgoing network traffic.
I
Incident Response
An organized approach to addressing and managing a security breach.
Intrusion Detection System (IDS)
A device or software that monitors a network for malicious activity.
M
Malware
Software intentionally designed to cause damage to a computer, server, or network.
Man-in-the-Middle Attack
An attack where the attacker secretly relays and possibly alters communication.
P
Phishing
Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Penetration Testing
Simulated attacks on a system to find vulnerabilities.
R
Ransomware
Malware that locks or encrypts a victim's data, demanding payment for restoration.
S
Social Engineering
Manipulating people into giving up confidential information.
SQL Injection
An attack that allows malicious SQL statements to control a database server.
T
Trojan Horse
Malicious software disguised as legitimate software.
V
Virus
Malware that replicates itself by modifying other programs and inserting its own code.
Vulnerability
A weakness in a system that can be exploited to cause harm.
W
Worm
A standalone malware computer program that replicates itself to spread to other computers.
Whaling
A phishing attack targeted at senior executives or important individuals.