Cybersecurity Terminology

Understand key cybersecurity concepts, explained simply and clearly.

A


Antivirus

Software designed to detect, prevent, and remove malware.

Authentication

The process of verifying the identity of a user, system, or entity.

B


Botnet

A network of computers infected with malware and controlled as a group.

Brute Force Attack

A trial-and-error method used to decode encrypted data.

C


Cryptography

The practice of securing information by transforming it into unreadable formats.

Cross-Site Scripting (XSS)

An attack that injects malicious scripts into web pages viewed by users.

D


Denial of Service (DoS)

An attack meant to shut down a machine or network by overwhelming it.

Data Breach

An incident where confidential information is accessed without authorization.

E


Encryption

The process of converting data into code to prevent unauthorized access.

F


Firewall

A security system that monitors and controls incoming and outgoing network traffic.

I


Incident Response

An organized approach to addressing and managing a security breach.

Intrusion Detection System (IDS)

A device or software that monitors a network for malicious activity.

M


Malware

Software intentionally designed to cause damage to a computer, server, or network.

Man-in-the-Middle Attack

An attack where the attacker secretly relays and possibly alters communication.

P


Phishing

Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.

Penetration Testing

Simulated attacks on a system to find vulnerabilities.

R


Ransomware

Malware that locks or encrypts a victim's data, demanding payment for restoration.

S


Social Engineering

Manipulating people into giving up confidential information.

SQL Injection

An attack that allows malicious SQL statements to control a database server.

T


Trojan Horse

Malicious software disguised as legitimate software.

V


Virus

Malware that replicates itself by modifying other programs and inserting its own code.

Vulnerability

A weakness in a system that can be exploited to cause harm.

W


Worm

A standalone malware computer program that replicates itself to spread to other computers.

Whaling

A phishing attack targeted at senior executives or important individuals.