- Access Control – The ability to control access to data or resources.
- Antivirus – Software used to detect and remove malware.
- Authentication – Authentication, is the process by which users identify themselves.
- Biometrics – Biometrics authenticating users using their physical or behavioral characteristics.
- Bug – Errors or problems in software or systems.
- Brute Force Attack – A method of trying to gain access to the system by trying all possibilities to guess the password or keys.
- Cryptography – The process of encrypting and decrypting data.
- Cybersecurity – The process of securing computer systems and networks.
- Data Breach – Data breach, unauthorized access of confidential data.
- DDoS Attack – Denial of service attack, an attempt to overload a website or service, causing it to crash.
- Encryption – Encrypting information ensures the security of data.
- Endpoint Security – Endpoint security, is the protection of devices and networks against end-user devices.
- Firmware – Software that runs on hardware.
- Firewall – A firewall that protects a computer network from unwanted access.
- Hacker – A person who gains unauthorized access to computer systems and searches for vulnerabilities.
- Incident Response – Incident response is the process of quickly responding to security breaches.
- IoT Security – Internet of Things security, securing connected devices.
- Keylogger – Keylogger, is malware that monitors users’ keyboard input.
- Malware – Malicious software is used to damage computers or steal data.
- Network Security – Network security, keeping data safe over the network.
- Password – The secret word or phrase that users use for authentication.
- Patch – An update to software to fix security vulnerabilities.
- Penetration Testing – Penetration testing is an attack simulation performed to identify security vulnerabilities of a system.
- Phishing – A method of tricking users into giving up personal information using fake websites or emails.
- Privacy Policy – A privacy policy is a document that explains how an organization processes personal data.
- Ransomware – Malware that blocks access to data and demands a ransom.
- Rogue Access Point – A rogue access point that is created secretly and monitors network traffic.
- Rootkit – A hidden malware that hijacks a computer’s operating system.
- Security Awareness Training – Security awareness training makes employees aware of cyber threats.
- Security Intelligence – Threat intelligence, is the process of monitoring and analyzing security threats.
- Social Engineering – Social engineering is a method of trying to gain access to confidential information by manipulating people.
- Social Media Security – Social media security encourages safe behavior on social media platforms.
- Threat Intelligence – Threat intelligence, is the process of monitoring and analyzing security threats.
- Trojan Horse – A type of malware in which malicious software infects users while appearing to be innocent.
- Two-Factor Authentication (2FA) – Two-factor authentication adds another layer of security other than a password.
- Virtual Private Network (VPN) – Virtual private network, is a technology that provides a secure connection over the internet.
- Virus – Malicious software that can infect, copy, and damage computer programs.
- Vulnerability – A vulnerability is a weak point in a system that can be exploited by malicious users.
- Web Application Firewall (WAF) – A web application firewall protects web applications from malicious attacks.
- Zero Trust Security – Zero Trust security is a security model that constantly questions the trustworthiness of each user and device.
| Word | Explanation |
|---|---|
| Access Control | The ability to control access to data or resources. |
| Antivirus | Software used to detect and remove malware. |
| Authentication | Authentication, is the process by which users identify themselves. |
| Biometrics | Biometrics authenticating users using their physical or behavioral characteristics. |
| Bug | Errors or problems in software or systems. |
| Brute Force Attack | A method of trying to gain access to the system by trying all possibilities to guess the password or keys. |
| Cryptography | The process of encrypting and decrypting data. |
| Cybersecurity | The process of securing computer systems and networks. |
| Data Breach | Data breach, unauthorized access of confidential data. |
| DDoS Attack | Denial of service attack, an attempt to overload a website or service, causing it to crash. |
| Encryption | Encrypting information ensures the security of data. |
| Endpoint Security | Endpoint security, is the protection of devices and networks against end-user devices. |
| Firmware | Software that runs on hardware. |
| Firewall | A firewall that protects a computer network from unwanted access. |
| Hacker | A person who gains unauthorized access to computer systems and searches for vulnerabilities. |
| Incident Response | Incident response is the process of quickly responding to security breaches. |
| IoT Security | Internet of Things security, securing connected devices. |
| Keylogger | Keylogger, is malware that monitors users’ keyboard input. |
| Malware | Malicious software is used to damage computers or steal data. |
| Network Security | Network security, keeping data safe over the network. |
| Password | The secret word or phrase that users use for authentication. |
| Patch | An update to software to fix security vulnerabilities. |
| Penetration Testing | Penetration testing is an attack simulation performed to identify security vulnerabilities of a system. |
| Phishing | A method of tricking users into giving up personal information using fake websites or emails. |
| Privacy Policy | A privacy policy is a document that explains how an organization processes personal data. |
| Ransomware | Malware that blocks access to data and demands a ransom. |
| Rogue Access Point | A rogue access point that is created secretly and monitors network traffic. |
| Rootkit | A hidden malware that hijacks a computer’s operating system. |
| Security Awareness Training | Security awareness training makes employees aware of cyber threats. |
| Security Intelligence | Threat intelligence, is the process of monitoring and analyzing security threats. |
| Social Engineering | Social engineering is a method of trying to gain access to confidential information by manipulating people. |
| Social Media Security | Social media security encourages safe behavior on social media platforms. |
| Threat Intelligence | Threat intelligence, is the process of monitoring and analyzing security threats. |
| Trojan Horse | A type of malware in which malicious software infects users while appearing to be innocent. |
| Two-Factor Authentication (2FA) | Two-factor authentication adds another layer of security other than a password. |
| Virtual Private Network (VPN) | Virtual private network, is a technology that provides a secure connection over the internet. |
| Virus | Malicious software that can infect, copy, and damage computer programs. |
| Vulnerability | A vulnerability is a weak point in a system that can be exploited by malicious users. |
| Web Application Firewall (WAF) | A web application firewall protects web applications from malicious attacks. |
| Zero Trust Security | Zero Trust security is a security model that constantly questions the trustworthiness of each user and device. |