Malware
Short for "malicious software," malware is any program designed to damage or gain unauthorized access to a computer system. This includes viruses, worms, trojans, and ransomware.
Phishing
A cyberattack method where attackers pose as legitimate institutions to trick users into revealing sensitive information. Often conducted through deceptive emails, websites, or text messages.
Encryption
The process of converting information into a code to prevent unauthorized access. It's a crucial method for protecting sensitive data during storage and transmission.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic. It acts as a barrier between a trusted network and an untrusted network.
Two-Factor Authentication (2FA)
A security process requiring users to provide two different authentication factors to verify their identity. This typically combines something you know (password) with something you have (phone).
VPN
Virtual Private Network creates a secure, encrypted connection over a less secure network. It allows safe transmission of sensitive data across public networks while maintaining privacy.
Zero-Day Exploit
An attack that targets a software vulnerability unknown to the software vendor or antivirus vendors. These are particularly dangerous as there are no patches available when the attack occurs.
Social Engineering
The psychological manipulation of people into performing actions or divulging confidential information. It relies on human error rather than technical hacking techniques.
Penetration Testing
An authorized simulated cyberattack on a computer system to evaluate system security. It helps identify vulnerabilities that could be exploited by malicious attackers.
Ransomware
A type of malicious software that encrypts a victim's files and demands payment for the decryption key. It's become one of the most prevalent cyber threats to organizations.
Bot Networks
Also known as botnets, these are networks of compromised computers controlled by attackers to perform distributed attacks, send spam, or mine cryptocurrency without the owners' knowledge.
DDoS Attacks
Distributed Denial of Service attacks overwhelm systems by flooding them with traffic from multiple sources, making services unavailable to legitimate users.
Biometric Authentication
A security process that relies on unique biological characteristics like fingerprints, facial features, or iris patterns to verify a user's identity.
SQL Injection
A code injection technique used to attack data-driven applications by inserting malicious SQL statements into entry fields for execution.
AI Security
The use of artificial intelligence and machine learning to detect and prevent cyber threats, as well as the protection against AI-powered cyber attacks.
IoT Security
Protecting Internet of Things devices and networks from security threats while safeguarding the data they collect and transmit.
Identity Access Management
Framework of policies and technologies ensuring that the right users have appropriate access to technology resources at the right times.
Mobile Security
Protection of smartphones, tablets, and other portable devices from threats and vulnerabilities associated with wireless computing.
Cloud Security
Set of policies, controls, procedures, and technologies working together to protect cloud-based systems, data, and infrastructure.
Cross-Site Scripting (XSS)
A security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users, compromising their interactions.
Endpoint Security
The practice of securing end-user devices like desktops, laptops, and mobile devices from malicious threats and cyberattacks.
Patch Management
The systematic process of distributing and applying updates to software, addressing security vulnerabilities and improving functionality.
Security Awareness Training
Educational programs designed to teach employees about cybersecurity best practices and how to identify and prevent security threats.