This page covers complete cybersecurity glossary, illustrating key:
- Concepts
- Processes
- Attacks
- Methologies
- Principles
- Acronyms
- Technologies
A – Cyber Security Glossary
Advanced persistent threat (APT) – A potential cyberattack in which the attacker uses sophisticated methods and/or tools, expands the attack to more and more systems within the target organization over time, and
covers up their tracks to avoid detection
Antivirus software – A Computer software product installed on end point devices to protect them from malware by searching for, detecting, and removing malware from the device.
Authentication – The method by which information systems verify that a user who is requesting access to a resource really is who they claim to be.
Authorization -The act of granting access or receiving official permission to perform tasks and function.
Access – The permission or ability to enter or communicate with a person or thing. In cybersecurity it is the right that is granted to a subject to per form a function with an object.
Accountability – Subject to the obligation to report, explain, or justify something. In cybersecurity accountability is accomplished through logging and reporting user actions and system events.
Activation – The action of making something operational. In cybersecurity activation refers to the action of making a plan, such as a business continuity plan, disaster recovery plan, or incident response plan, operational, usually after a disaster or incident has occurred.
Asymmetric encryption – A type of encryption that uses two keys that are mathematically related: a public key and a private key.
Availability – The state of information systems being availaible to provide services 24/7 to customers. Data Centre needs to be up and running 24/7 to provide essential services.
Authenticity – The quality of being genuine, trustworthy, or real supported by evidence
Access control models – Conceptual models that illustrate the different methods and techniques employed to control the level of access and permission that subjects (e.g., users or system processes) have over objects
(e.g., computers, systems). These models are implemented using a combination of features in tools and technologies such as operating systems and applications.
B – Cyber Glossary
backdoor – Any method whereby an unauthorized user can bypass security controls to gain access and evade the environment succesfully
botnet – A network of compromised computers used to carry out malicious
activity under the control of a hacker
brute force -A method of achieving something by the application of raw effort as opposed to the use of efficiency, skill, or sophisticated techniques. User Attempts multiple login attempts and trying automated techniques to randomly guess usernames and passwords.
business continuity – The process of developing plans and procedures for maintaining business operations in the event of a disaster or security incident.
Bollards – Pillars or spheres made from concrete, metal, or other hard materials that are typically found outside of buildings between the parking lot and the entrance of the building, intended to serve as a physical barrier to block vehicular access.
C – Cyber Glossary
Computer – A device, machine, or system that can be programmed to carry out a sequence of operations. A computer normally consists of hardware, software in the form of an operating system, peripheral devices such as storage media, and programs that carry out operations.
Computer networks – The infrastructure that allows computers to talk to one another. They consist of hardware, software, and technologies used to allow devices and systems to communicate.
confidentiality – The state of keeping Information systems and data secret and providing access to authorized entities.
Compliance – The process of ensuring alignment with applicable laws, regulations, external standards, ethical conduct, and other organizational goals and objectives.
Compromise – To reveal or expose something to an unauthorized person or entity. Also, to cause the impairment or degradation of something.
client – Computers that interact with a server by initiating a connection.
Control – A countermeasure or safeguard used to counteract or reduce the security risk relating to an organization’s or a person’s assets
Cyberattack – An attempt to gain unauthorized access to a computer or information system for the purpose of causing harm, stealing, disrupting, or degrading normal operation.
Cybersecurity -The practice of protecting information resources from unauthorized use. Also known as information security or IT security. Also refers to the various technologies, frameworks, practices, and measures
used for protecting information resources.
Cross-site scripting – A type of cyberattack in which the attacker injects a malicious script into the field of a website or application.