Glossary of Cybersecurity Terms
Sometimes the terminology in any given field can get overwhelming. Here is a comprehensive that may offer some context in your cybersecurity research.
Access Control and Authentication:
- Access Control: The practice of restricting access to resources and data only to authorized users or systems.
- Authentication: The process of verifying the identity of a user or system before granting access.
Cybersecurity Threats:
- Black Hat Hacker: A malicious hacker who exploits security flaws for personal gain or to cause harm.
- Blacklist: A list of banned or known malicious entities, such as IP addresses or websites, that are blocked from accessing a system or network.
- Botnet: A network of compromised computers (bots) controlled by a single entity, typically used for malicious purposes.
- Brute Force Attack: An attack method that involves trying all possible combinations of passwords until the correct one is found.
- Cyber Attack: An intentional, malicious act designed to compromise the security of computer systems or networks.
- Exploit: A piece of software or code that takes advantage of a vulnerability to carry out an attack.
- Malware: Malicious software, such as viruses, worms, Trojans, and ransomware, designed to harm or compromise computer systems.
- Phishing: A type of cyberattack where attackers use deceptive emails or websites to trick individuals into revealing sensitive information like passwords and credit card details.
- Ransomware: Malware that encrypts a victim's files and demands a ransom in exchange for the decryption key.
- Rootkit: Malware that provides unauthorized access to a computer system, often concealing its presence.
- Session Hijacking: An attack where an attacker takes control of a user's session to impersonate them.
- Social Engineering Attack: An attack that exploits human psychology to manipulate individuals into divulging confidential information or taking certain actions.
- Spoofing: Impersonating another entity to gain trust or deceive users, often used in phishing and email scams.
- Spyware: Malware that secretly gathers information about a user's activities without their knowledge.
- Threat Actor: An individual, group, or organization responsible for carrying out cyber threats or attacks.
- Virus: Malware that can replicate itself and spread to other files and systems.
- Worm: Self-replicating malware that spreads independently across systems and networks.
- Zero-Day Vulnerability: A security flaw or weakness in software or hardware that is not yet known to the vendor or public, making it a target for exploitation by attackers.
- Zombie: A compromised computer or device controlled by an attacker without the user's knowledge.
Security Measures and Tools:
- Antivirus (AV): Software designed to detect and remove malicious software (malware) from computer systems.
- Cryptography: The study and practice of securing communication and data by encoding it into an unreadable format.
- Data Encryption Standard (DES): A widely used symmetric-key encryption algorithm.
- Data Loss Prevention (DLP): Strategies and tools used to prevent the unauthorized leakage of sensitive data.
- Firewall: A network security device or software that monitors and filters incoming and outgoing network traffic to protect against unauthorized access.
- Intrusion Detection System (IDS): A security tool that monitors network traffic for suspicious activities and alerts administrators to potential breaches.
- Intrusion Prevention System (IPS): A security tool that actively blocks or prevents suspicious network traffic or attacks.
- Mobile Device Management (MDM): Solutions for managing and securing mobile devices within an organization.
- Multi-Factor Authentication (MFA): An authentication method that requires users to provide two or more separate authentication factors for added security.
- Penetration Testing: The process of simulating cyberattacks to identify and address vulnerabilities in a system or network.
- Pentesting Tools: Tools and software used by penetration testers to identify vulnerabilities.
- Perimeter Security: Security measures that protect the outer boundary of a network or system.
- Web Application Firewall (WAF): A security system designed to protect web applications from attacks.
Security Concepts and Strategies:
- Cyber Hygiene: Best practices for maintaining good cybersecurity habits, including regular software updates and secure password management.
- Cyber Resilience: The ability to prepare for, respond to, and recover from cyberattacks or security incidents.
- Cyber Threat Intelligence: Information about potential cyber threats, including attack vectors, tactics, and threat actors, used to enhance cybersecurity defenses.
- Cybersecurity Analyst: A professional responsible for monitoring and analyzing security threats and incidents.
- Cybersecurity Awareness: The level of knowledge and vigilance regarding cybersecurity among individuals and organizations.
- Cybersecurity Framework: A set of guidelines, best practices, and standards for managing and improving cybersecurity.
- Cybersecurity Policy: A set of guidelines and rules governing an organization's approach to cybersecurity.
- Cybersecurity: The practice of protecting computer systems, networks, and data from security breaches, attacks, and unauthorized access.
- Data Classification: The categorization of data based on its sensitivity and importance for security purposes.
- Incident Response Plan (IRP): A documented strategy and procedures for responding to security incidents.
- Incident Response: The structured process of identifying, managing, and mitigating security incidents and breaches.
- Information Security: The practice of protecting information from unauthorized access, disclosure, alteration, or destruction.
- Least Privilege: The principle of granting users or systems only the minimum access or privileges required to perform their tasks.
- Risk Assessment: The process of identifying and evaluating potential security risks and vulnerabilities.
- Security Policy: A documented set of rules, guidelines, and procedures governing an organization's cybersecurity practices.
- Security Token Service (STS): A service that issues security tokens for authentication and access control.
- Security Token: A physical or digital device that generates one-time codes for authentication or access control.
- Security Vulnerability Assessment: A systematic review of an organization's systems and infrastructure to identify vulnerabilities.
- Server Hardening: The process of securing a server by reducing its attack surface and potential vulnerabilities.
- SOC (Security Operations Center): A centralized team and facility responsible for monitoring and responding to security incidents.
- Threat Intelligence: Information and analysis of emerging cyber threats and attack trends.
- Trusted Platform Module (TPM): A hardware security component that provides secure storage and cryptographic functions.
- Two-Factor Authentication (2FA): A security mechanism that requires users to provide two different authentication factors (e.g., a password and a one-time code) to access an account or system.
- Zero Trust Security: A security model that assumes no trust, even within an organization's network, and requires verification for all access attempts.
Networking and Infrastructure Security:
- Firewall Rule: A predefined set of instructions that dictate how a firewall should handle specific types of network traffic.
- Perimeter Security: Security measures that protect the outer boundary of a network or system.
- VPN (Virtual Private Network): A network technology that allows users to establish secure connections over the internet, protecting their data from eavesdropping.
Data and Privacy:
- Data Breach: Unauthorized access or exposure of sensitive data to unauthorized individuals or entities.
- Personally Identifiable Information (PII): Information that can be used to identify an individual, such as name, address, or Social Security number.
- Privacy Policy: A statement outlining an organization's practices regarding the collection and use of personal information.
Security Technology:
- Digital Certificate: A digital document that verifies the identity of a website or entity in secure communication.
- Encryption: The process of converting data into a secure code to protect it from unauthorized access.
- Public Key Infrastructure (PKI): A framework that manages digital keys and certificates for secure communication.
Cybersecurity Practices and Culture:
- Cybersecurity Analyst: A professional responsible for monitoring and analyzing security threats and incidents.
- Cybersecurity Awareness: The level of knowledge and vigilance regarding cybersecurity among individuals and organizations.
- Security Awareness Training: Education and training provided to employees and users to increase their awareness of cybersecurity threats and best practices.
- Social Media Security: Practices and measures to protect social media accounts and data from cyber threats.
Miscellaneous:
- Data Classification: The categorization of data based on its sensitivity and importance for security purposes.
- Digital Forensics: The process of collecting and analyzing digital evidence for investigative purposes.
- Hashing: A cryptographic technique used to transform data into a fixed-length string of characters, often used for password storage.
- Internet Security: Measures and practices to safeguard internet-connected systems and data.
- Man-in-the-Middle (MitM) Attack: An attack where an attacker intercepts and potentially modifies communication between two parties without their knowledge.
- Patch Management: The process of planning, testing, and deploying software updates (patches) to mitigate security vulnerabilities.
- Patch Tuesday: A scheduled day when software vendors release security patches and updates.
- Patch: A software update or fix released by a vendor to address security vulnerabilities in their products.
- Port Scanning: The process of scanning a network for open ports and services.
- Spam: Unsolicited and often irrelevant or malicious email messages sent in bulk.
- Threat Intelligence: Information and analysis of emerging cyber threats and attack trends.
- White Hat Hacker: An ethical hacker who conducts security testing and research with the permission of system owners to identify vulnerabilities.
- Whitelist: A list of trusted applications, devices, or entities that are allowed access to a system or network.
- Zone-Based Firewall: A firewall that filters traffic based on network zones or segments.