25 Cybersecurity Terms You Should Know….

https://www.dummies.com/

The topic of cybersecurity is sweeping the world by storm with some of the largest and most advanced companies in the world falling victim to cyber-attacks in just the last 5 years. Against that backdrop, highly personal and sensitive information such as social security numbers was recently stolen in the Equifax hack, affecting over 145 million people. Unfortunately, as long as computers exist, we are at risk of having our digital data compromised and manipulated. However, living in the digital age is not all that scary – especially if you know what you’re doing.

Understanding how your device works is not as hard as it sounds. But, if you could nail simultaneous equations in high school then you can learn cyber basics that will get you pretty far in your security.

We’re here to make this learning easier by providing a list of the 25 most important cyber security terminology that everyone should know about:

1. Cloud

ImageSource:https://pyrus.com/en/blog/

A technology that allows us to access our files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.

2. Software

ImageSource:https://gbatemp.net/threads/

A set of programs that tell a computer to perform a task. These instructions are compiled into a package that users can install and use. For example, Microsoft Office is an application software.

3. Domain

ImageSource:http://priceonomics.com/

A group of computers, printers and devices that are interconnected and governed as a whole. For example, your computer is usually part of a domain at your workplace.

4. Virtual Private Network (VPN)

ImageSource:https://www.vpnreports.com/vpn-protocols/

A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.

5. IP Address

ImageSource:http://www.routerfreak.com/

An internet version of a home address for your computer, which is identified when it communicates over a network; For example, connecting to the internet (a network of networks).

6. Exploit

ImageSource:http://www.betanews.com/

A malicious application or script that can be used to take advantage of a computer’s vulnerability.

7. Breach

ImageSource:https://www.enhancedtech.com/

The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.

8. Firewall

ImageSource:http://vibeglobal.com/

A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.

9. Malware “The Bad Guy”

ImageSource:http://teachprivacy.com/malware-training/

An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.

10. Virus

ImageSource:https://www.foreignpolicyi.org/

A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.

11. Ransomware

ImageSource:https://www.csoonline.com/article/3541810/

A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid to have them decrypted or recovered. For example, WannaCry Ransomware. For more information on Ransomware, check out our free Ransomware Guide.

12. Trojan horse

ImageSource:https://www.istockphoto.com/

A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.

13. Worm

ImageSource:https://www.depositphotos.com/

A piece of malware that can replicate itself to spread the infection to other connected computers.

14. Bot/Botnet

ImageSource:http://www.ehackingnews.com/

A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer. A collection of these infected computers is known as a “botnet” and is controlled by the hacker or “bot-herder”.

15. Spyware

ImageSource:https://www.wireless4u.ca/what-is-spyware/

A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.

16. Rootkit

ImageSource:http://www.wehatemalware.com/

Another kind of malware that allows cybercriminals to remotely control your computer. Rootkits are especially damaging because they are hard to detect, making it likely that this type of malware could live on your computer for a long time.

17. DDoS

ImageSource:https://www.whatismyipaddress.com/

An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets).

18. Phishing or Spear Phishing

ImageSource:https://www.clipartkey.com/

A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.

19. Encryption

ImageSource:https://www.skyhidev.com/

The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.

20. BYOD (Bring Your Own Device)

ImageSource:https://www.ophtek.com/

Refers to a company security policy that allows for employees’ devices to be used in business. A BYOD policy sets limitations and restrictions on whether or not a personal phone or laptop can be connected over the corporate network.

21. Pen-testing

ImageSource:https://www.vaultes.com/

Short for “penetration testing,” this practice is a means of evaluating security using hacker tools and techniques to discover vulnerabilities and evaluate security flaws.

22. Social Engineering

ImageSource:https://www.vaultes.com/

A technique used to manipulate and deceive people to gain sensitive and private information. Scams based on social engineering are built around how people think and act. So, once a hacker understands what motivates a person’s actions, they can usually retrieve exactly what they’re looking for – like financial data and passwords.

23. Clickjacking

ImageSource:https://www.beencrypted.com/

A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.

24. Deepfake

ImageSource:https://www.neowin.net/news/

An audio or video clip that has been edited and manipulated to seem real or believable. The most dangerous consequence of the popularity of deepfakes is that they can easily convince people into believing a certain story or theory that may result in user-behavior with a bigger impact as in political or financial.

25. White Hat / Black Hat

When speaking in cyber security terms, the differences in hacker “hats” refers to the intention of the hacker. For example:

ImageSource:http://www.hacking-point.blogspot.com/
  • White hat: Breaches the network to gain sensitive information with the owner’s consent – making it completely legal. This method is usually employed to test infrastructure vulnerabilities.
  • Black hat: Hackers that break into the network to steal information that will be used to harm the owner or the users without consent. It’s entirely illegal. 
  • Grey hat: Somewhere between white and black are gray hat hackers. Gray hat hackers enact a blend of both black hat and white hat activities. Gray hat hackers often look for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem. Gray hat hackers may sometimes violate laws or usual ethical standards, but they do not have the malicious intent typical of a black hat hacker.        

Conclusion

Of course, we have only covered some important terminologies as far as cybersecurity is concerned, but over time, we shall get familiar with other terms. Sometimes, we experience these things but do not have names for them.
I hope this article would help some of us put names to some cybersecurity encounters on the internet. I implore us to stay cyber aware because knowledge is power!

Total
0
Shares
1 1 vote
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
Prev
7 Ways to Defend Mobile Apps, APIs From Cyberattacks….

7 Ways to Defend Mobile Apps, APIs From Cyberattacks….

There are two essential elements driving progress in today’s digital-first

Next
If Someone Has Your IP, What Can They Do…?

If Someone Has Your IP, What Can They Do…?

Privacy is more important than ever nowadays – especially on the Internet

You May Also Like
0
Would love your thoughts, please comment.x
()
x