Skip to content
Anasayfa » Cyber Dictionary

Cyber Dictionary

  • Access Control – The ability to control access to data or resources.
  • Antivirus – Software used to detect and remove malware.
  • Authentication – Authentication, is the process by which users identify themselves.
  • Biometrics – Biometrics authenticating users using their physical or behavioral characteristics.
  • Bug – Errors or problems in software or systems.
  • Brute Force Attack – A method of trying to gain access to the system by trying all possibilities to guess the password or keys.
  • Cryptography – The process of encrypting and decrypting data.
  • Cybersecurity – The process of securing computer systems and networks.
  • Data Breach – Data breach, unauthorized access of confidential data.
  • DDoS Attack – Denial of service attack, an attempt to overload a website or service, causing it to crash.
  • Encryption – Encrypting information ensures the security of data.
  • Endpoint Security – Endpoint security, is the protection of devices and networks against end-user devices.
  • Firmware – Software that runs on hardware.
  • Firewall – A firewall that protects a computer network from unwanted access.
  • Hacker – A person who gains unauthorized access to computer systems and searches for vulnerabilities.
  • Incident Response – Incident response is the process of quickly responding to security breaches.
  • IoT Security – Internet of Things security, securing connected devices.
  • Keylogger – Keylogger, is malware that monitors users’ keyboard input.
  • Malware – Malicious software is used to damage computers or steal data.
  • Network Security – Network security, keeping data safe over the network.
  • Password – The secret word or phrase that users use for authentication.
  • Patch – An update to software to fix security vulnerabilities.
  • Penetration Testing – Penetration testing is an attack simulation performed to identify security vulnerabilities of a system.
  • Phishing – A method of tricking users into giving up personal information using fake websites or emails.
  • Privacy Policy – A privacy policy is a document that explains how an organization processes personal data.
  • Ransomware – Malware that blocks access to data and demands a ransom.
  • Rogue Access Point – A rogue access point that is created secretly and monitors network traffic.
  • Rootkit – A hidden malware that hijacks a computer’s operating system.
  • Security Awareness Training – Security awareness training makes employees aware of cyber threats.
  • Security Intelligence – Threat intelligence, is the process of monitoring and analyzing security threats.
  • Social Engineering – Social engineering is a method of trying to gain access to confidential information by manipulating people.
  • Social Media Security – Social media security encourages safe behavior on social media platforms.
  • Threat Intelligence – Threat intelligence, is the process of monitoring and analyzing security threats.
  • Trojan Horse – A type of malware in which malicious software infects users while appearing to be innocent.
  • Two-Factor Authentication (2FA) – Two-factor authentication adds another layer of security other than a password.
  • Virtual Private Network (VPN) – Virtual private network, is a technology that provides a secure connection over the internet.
  • Virus – Malicious software that can infect, copy, and damage computer programs.
  • Vulnerability – A vulnerability is a weak point in a system that can be exploited by malicious users.
  • Web Application Firewall (WAF) – A web application firewall protects web applications from malicious attacks.
  • Zero Trust Security – Zero Trust security is a security model that constantly questions the trustworthiness of each user and device.
WordExplanation
Access ControlThe ability to control access to data or resources.
AntivirusSoftware used to detect and remove malware.
AuthenticationAuthentication, is the process by which users identify themselves.
BiometricsBiometrics authenticating users using their physical or behavioral characteristics.
BugErrors or problems in software or systems.
Brute Force AttackA method of trying to gain access to the system by trying all possibilities to guess the password or keys.
CryptographyThe process of encrypting and decrypting data.
CybersecurityThe process of securing computer systems and networks.
Data BreachData breach, unauthorized access of confidential data.
DDoS AttackDenial of service attack, an attempt to overload a website or service, causing it to crash.
EncryptionEncrypting information ensures the security of data.
Endpoint SecurityEndpoint security, is the protection of devices and networks against end-user devices.
FirmwareSoftware that runs on hardware.
FirewallA firewall that protects a computer network from unwanted access.
HackerA person who gains unauthorized access to computer systems and searches for vulnerabilities.
Incident ResponseIncident response is the process of quickly responding to security breaches.
IoT SecurityInternet of Things security, securing connected devices.
KeyloggerKeylogger, is malware that monitors users’ keyboard input.
MalwareMalicious software is used to damage computers or steal data.
Network SecurityNetwork security, keeping data safe over the network.
PasswordThe secret word or phrase that users use for authentication.
PatchAn update to software to fix security vulnerabilities.
Penetration TestingPenetration testing is an attack simulation performed to identify security vulnerabilities of a system.
PhishingA method of tricking users into giving up personal information using fake websites or emails.
Privacy PolicyA privacy policy is a document that explains how an organization processes personal data.
RansomwareMalware that blocks access to data and demands a ransom.
Rogue Access PointA rogue access point that is created secretly and monitors network traffic.
RootkitA hidden malware that hijacks a computer’s operating system.
Security Awareness TrainingSecurity awareness training makes employees aware of cyber threats.
Security IntelligenceThreat intelligence, is the process of monitoring and analyzing security threats.
Social EngineeringSocial engineering is a method of trying to gain access to confidential information by manipulating people.
Social Media SecuritySocial media security encourages safe behavior on social media platforms.
Threat IntelligenceThreat intelligence, is the process of monitoring and analyzing security threats.
Trojan HorseA type of malware in which malicious software infects users while appearing to be innocent.
Two-Factor Authentication (2FA)Two-factor authentication adds another layer of security other than a password.
Virtual Private Network (VPN)Virtual private network, is a technology that provides a secure connection over the internet.
VirusMalicious software that can infect, copy, and damage computer programs.
VulnerabilityA vulnerability is a weak point in a system that can be exploited by malicious users.
Web Application Firewall (WAF)A web application firewall protects web applications from malicious attacks.
Zero Trust SecurityZero Trust security is a security model that constantly questions the trustworthiness of each user and device.