- Access Control – The ability to control access to data or resources.
- Antivirus – Software used to detect and remove malware.
- Authentication – Authentication, is the process by which users identify themselves.
- Biometrics – Biometrics authenticating users using their physical or behavioral characteristics.
- Bug – Errors or problems in software or systems.
- Brute Force Attack – A method of trying to gain access to the system by trying all possibilities to guess the password or keys.
- Cryptography – The process of encrypting and decrypting data.
- Cybersecurity – The process of securing computer systems and networks.
- Data Breach – Data breach, unauthorized access of confidential data.
- DDoS Attack – Denial of service attack, an attempt to overload a website or service, causing it to crash.
- Encryption – Encrypting information ensures the security of data.
- Endpoint Security – Endpoint security, is the protection of devices and networks against end-user devices.
- Firmware – Software that runs on hardware.
- Firewall – A firewall that protects a computer network from unwanted access.
- Hacker – A person who gains unauthorized access to computer systems and searches for vulnerabilities.
- Incident Response – Incident response is the process of quickly responding to security breaches.
- IoT Security – Internet of Things security, securing connected devices.
- Keylogger – Keylogger, is malware that monitors users’ keyboard input.
- Malware – Malicious software is used to damage computers or steal data.
- Network Security – Network security, keeping data safe over the network.
- Password – The secret word or phrase that users use for authentication.
- Patch – An update to software to fix security vulnerabilities.
- Penetration Testing – Penetration testing is an attack simulation performed to identify security vulnerabilities of a system.
- Phishing – A method of tricking users into giving up personal information using fake websites or emails.
- Privacy Policy – A privacy policy is a document that explains how an organization processes personal data.
- Ransomware – Malware that blocks access to data and demands a ransom.
- Rogue Access Point – A rogue access point that is created secretly and monitors network traffic.
- Rootkit – A hidden malware that hijacks a computer’s operating system.
- Security Awareness Training – Security awareness training makes employees aware of cyber threats.
- Security Intelligence – Threat intelligence, is the process of monitoring and analyzing security threats.
- Social Engineering – Social engineering is a method of trying to gain access to confidential information by manipulating people.
- Social Media Security – Social media security encourages safe behavior on social media platforms.
- Threat Intelligence – Threat intelligence, is the process of monitoring and analyzing security threats.
- Trojan Horse – A type of malware in which malicious software infects users while appearing to be innocent.
- Two-Factor Authentication (2FA) – Two-factor authentication adds another layer of security other than a password.
- Virtual Private Network (VPN) – Virtual private network, is a technology that provides a secure connection over the internet.
- Virus – Malicious software that can infect, copy, and damage computer programs.
- Vulnerability – A vulnerability is a weak point in a system that can be exploited by malicious users.
- Web Application Firewall (WAF) – A web application firewall protects web applications from malicious attacks.
- Zero Trust Security – Zero Trust security is a security model that constantly questions the trustworthiness of each user and device.
Word | Explanation |
---|---|
Access Control | The ability to control access to data or resources. |
Antivirus | Software used to detect and remove malware. |
Authentication | Authentication, is the process by which users identify themselves. |
Biometrics | Biometrics authenticating users using their physical or behavioral characteristics. |
Bug | Errors or problems in software or systems. |
Brute Force Attack | A method of trying to gain access to the system by trying all possibilities to guess the password or keys. |
Cryptography | The process of encrypting and decrypting data. |
Cybersecurity | The process of securing computer systems and networks. |
Data Breach | Data breach, unauthorized access of confidential data. |
DDoS Attack | Denial of service attack, an attempt to overload a website or service, causing it to crash. |
Encryption | Encrypting information ensures the security of data. |
Endpoint Security | Endpoint security, is the protection of devices and networks against end-user devices. |
Firmware | Software that runs on hardware. |
Firewall | A firewall that protects a computer network from unwanted access. |
Hacker | A person who gains unauthorized access to computer systems and searches for vulnerabilities. |
Incident Response | Incident response is the process of quickly responding to security breaches. |
IoT Security | Internet of Things security, securing connected devices. |
Keylogger | Keylogger, is malware that monitors users’ keyboard input. |
Malware | Malicious software is used to damage computers or steal data. |
Network Security | Network security, keeping data safe over the network. |
Password | The secret word or phrase that users use for authentication. |
Patch | An update to software to fix security vulnerabilities. |
Penetration Testing | Penetration testing is an attack simulation performed to identify security vulnerabilities of a system. |
Phishing | A method of tricking users into giving up personal information using fake websites or emails. |
Privacy Policy | A privacy policy is a document that explains how an organization processes personal data. |
Ransomware | Malware that blocks access to data and demands a ransom. |
Rogue Access Point | A rogue access point that is created secretly and monitors network traffic. |
Rootkit | A hidden malware that hijacks a computer’s operating system. |
Security Awareness Training | Security awareness training makes employees aware of cyber threats. |
Security Intelligence | Threat intelligence, is the process of monitoring and analyzing security threats. |
Social Engineering | Social engineering is a method of trying to gain access to confidential information by manipulating people. |
Social Media Security | Social media security encourages safe behavior on social media platforms. |
Threat Intelligence | Threat intelligence, is the process of monitoring and analyzing security threats. |
Trojan Horse | A type of malware in which malicious software infects users while appearing to be innocent. |
Two-Factor Authentication (2FA) | Two-factor authentication adds another layer of security other than a password. |
Virtual Private Network (VPN) | Virtual private network, is a technology that provides a secure connection over the internet. |
Virus | Malicious software that can infect, copy, and damage computer programs. |
Vulnerability | A vulnerability is a weak point in a system that can be exploited by malicious users. |
Web Application Firewall (WAF) | A web application firewall protects web applications from malicious attacks. |
Zero Trust Security | Zero Trust security is a security model that constantly questions the trustworthiness of each user and device. |