Cybersecurity Glossary Explained: 25 Cybersecurity Terms Everyone Should Know

What does cybersecurity involve? The topic of cybersecurity has taken the world by storm, with some of the largest and most advanced companies in the world falling victim to cyberattacks over the past 5 years. Against this backdrop, highly personal and sensitive information, such as social security numbers, was stolen in the recent Equifax hack, affecting more than 145 million people. Unfortunately, as long as computers exist, we are at risk of digital data being corrupted and manipulated. However, living in the digital age isn’t that scary – especially if you know what you’re doing.

What are cybersecurity? Understanding how your device works isn’t as hard as it sounds. But if you can nail the long division at 4piecelevel, then you can understand the basics of networking, and this explanation of cybersecurity terms will allow you to protect your own personal safety, as well as the security of your company.

We’re here to simplify this learning curve by providing a list of the 25 most important cybersecurity terms that everyone should know:

25 Cybersecurity Terms: Cloud

A technology that allows us to access our files and/or services over the internet from anywhere in the world. Technically, it’s a group of computers with mass storage capacity that can handle requests remotely.

Software

A set of programs that tell a computer to perform a task. These instructions are compiled into packages that users can install and use. For example, Microsoft Office is an application software.

Domain name

A set of computers, printers, and devices that are connected to each other and managed as a whole. For example, your computer is usually part of your workplace domain.

Cyber Security Glossary – Virtual Private Network (V**P**N)

A tool that allows users to remain anonymous while using the internet by masking locations and encrypting traffic. Related: 10 Most Important Cybersecurity Tips for Your Users

IP Address

The Internet version of your computer’s home address, which is recognized when it communicates over a network; For example, connecting to the internet (a network of networks).

Exploit

Malicious applications or scripts that can be used to exploit computer vulnerabilities.

25 Cybersecurity Terms: Breach

The moment when a hacker successfully exploits a vulnerability in a computer or device and gains access to its files and network.

Firewalls

What does cybersecurity involve? A defensive technique designed to keep bad guys out. Firewalls can be hardware-based or software-based.

Cybersecurity Glossary: Malware “the bad guy”

An umbrella term that describes all forms of malware designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms, and ransomware.

Viruses

A type of malware designed to destroy, delete, or modify information on a computer before it can be spread to others. However, in recent years, viruses like Stuxnet have caused physical damage.

Ransomware

What are cybersecurity? A type of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It usually encrypts the files and demands a ransom payment in order to decrypt or restore them. For example, the WannaCry ransomware. For more information on ransomware, check out our free ransomware guide.

Trojan Horse

A type of malware that typically allows hackers to access a computer remotely through a “backdoor”.

Worms

A type of malware that can replicate itself to spread the infection to other connected computers.

Zombies/Botnets

A software application or script that executes a task based on commands, allowing an attacker to remotely take full control of the affected computer. The collection of these infected computers is called a “botnet” and is controlled by hackers or “zombie herders.” Related: Global Cybersecurity Skills Gap

What does cybersecurity involve? The topic of cybersecurity has taken the world by storm, with some of the largest and most advanced companies in the world falling victim to cyberattacks over the past 5 years. Against this backdrop, highly personal and sensitive information, such as social security numbers, was stolen in the recent Equifax hack, affecting more than 145 million people. Unfortunately, as long as computers exist, we are at risk of digital data being corrupted and manipulated. However, living in the digital age isn’t that scary – especially if you know what you’re doing.

What are cybersecurity? Understanding how your device works isn’t as hard as it sounds. But if you can nail the long division at 4piecelevel, then you can understand the basics of networking, and this explanation of cybersecurity terms will allow you to protect your own personal safety, as well as the security of your company.

We’re here to simplify this learning curve by providing a list of the 25 most important cybersecurity terms that everyone should know:

What does cybersecurity involve? Spyware

A type of malware that works by monitoring user activity without them knowing. These features include activity monitoring, collecting keystrokes, data collection (account information, logins, financial data), and more.

Rootkit

Another type of malware that allows cybercriminals to take control of your computer remotely. Rootkits are especially destructive because they are difficult to detect, so such malware is likely to persist on your computer for a long time.

DDoS

Stands for Distributed Denial of Service Acronym – a form of cyber attack. This attack aims to “flood” services such as websites with malicious traffic or data from multiple sources, often botnets, making them unusable.

Phishing or spear phishing

Explanation of cybersecurity terms: A technique used by hackers to obtain sensitive information. For example, using manual emails designed to trick people into revealing personal or confidential data, such as passwords and bank account information.

Encryption

The process of encoding data to prevent theft by ensuring that it can only be accessed using a key.

25 Cybersecurity Terms: BYOD (Bring Your Own Device)

Refers to a corporate security policy that allows an employee’s personal device to be used in business. BYOD policies set limits and restrictions on whether a personal phone or laptop can connect through the corporate network.

Penetration Testing

An abbreviation for “penetration testing,” the practice is a means of assessing security using hacking tools and techniques with the goal of finding vulnerabilities and assessing security flaws.

Social Engineering

A technique used to manipulate and deceive people into obtaining sensitive and private information. Social engineering-based scams are built around the way people think and behave. So, once hackers understand the motives for a person’s actions, they can often retrieve exactly what they’re looking for – such as financial data and passwords. Related: 15 Amazing Statistics on Data Security in Law Firms

What is cybersecurity? Click Hijacking

A type of hacking that tricks the victim into clicking on an unintentional link or button, often disguised as a harmless element.

25 Cybersecurity Terms: Deepfakes for further study

Audio or video clips that have been edited and processed to look authentic or believable. The most dangerous consequence of the popularity of deepfakes is that they can easily convince people to believe a certain story or theory that may lead to greater political or financial repercussions in user behavior.

Cybersecurity Glossary Explained: White Hat/Black Hat

What does cybersecurity involve? In cybersecurity terminology, the difference in a hacker’s “hat” refers to the intent of the hacker. For example:

  • White hat: Compromise the network to obtain sensitive information with the owner’s consent – making it completely legal. This method is often used to test for infrastructure vulnerabilities.
  • Black hat hackers: Hackers who break into networks to steal information that they will use to harm owners or users without consent. This is completely illegal.