A Glossary of Cybersecurity Terminology - for the rest of us!

Access – the ability to interact with a system in any way, be it for communication, networking, or malevolent purposes; having the option to handle a system's information and/or to control the system's functions

Antivirus – a program designed to detect, prevent, and remove computer viruses and other malware

Attack – any type of a cyber assault with the intention of altering a system, its operations, data, and resources

Backdoors – any undercover method used to avoid usual cybersecurity controls or authentication to enter a system

Blacklist – a list of entities that are denied access or privileges; opposite of whitelist

Cyberspace – space established with the help and intermediation of computational-digital technology; often used as a term for everything that's on the Internet

Cyberwarfare – warfare in cyberspace; a term used to describe the use of computers, Internet and other media for storing information to execute attacks on enemy infomation systems using weapons of information technology

Digital Forensics – a science that aims to collect, keep, find, analyse, and document digital evidence, i.e. data that is stored, processed or transferred in a digital form

Eavesdropping – a cyberattack that uses the technique of capturing smaller fragments of a network's communication and analysing the collected content for information

Firewall – a network device intended to filter network traffic in order to create a zone of cybersecurity

Information System – a system which collects, stores, processes and delivers information in a way that they are available to all of the users who want to access them, provided that they have proper authorization, thus being prone to cybersecurity threats

Keyloggers – also called keyboard capturing and keystroke logging, is used to monitor and record the keys that the user is pressing on the keyboard

Malware – mal(icious) + (soft)ware, any software intended to cause damage to a system; a computer program launched on a computer system without the user's consent with some kind of an undesirable effect

Payloads – the executional parts of malware, parts that actually perform the destructive action

Phishing – a cyberattack intended to acquire sensitive data by posing as a trustworthy entity in cyber communication

Rootkits – a group of programs intended to grant access that wouldn't normally be allowed, in other words, threatening cybersecurity through unauthorized access

Spoofing – very versatile and dangerous cybersecurity threat in which legitimate websites are successfully imitated in appearance by fake, malevolent websites

Trojans – Trojan Horses; malicious computer programs that are falsely presented as other programs with useful or desirable functions

Virus – the most common cybersecurity threat; a computer program that can “infect“ other programs by inserting a copy of itself into their structure

Whitelist - a list of entities that are granted access or privileges; opposite of blacklist

1420 Joh Ave, Ste A

Baltimore, MD 21227

(888) 4CyberPro (429-2377)

(Local) (410) 660-2160

©2020 by Cyber Protection Services. All Rights Reserved