click below
click below
Normal Size Small Size show me how
Cyber Security
| Term | Definition |
|---|---|
| Antivirus software | A software program that monitors a computer system or network communications for known malicious code and then attempts to remove or quarantine the offending items. |
| Backing up | Creating a duplicate copy of data onto a separate physical storage device or online/cloud storage solution. |
| Cyberattack | Any attempt to violate the security perimeter of a logical environment. |
| Data breach | The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment. |
| Data mining | The activity of analyzing and/or searching through data in order to find items of relevance, significance or value. |
| DDoS (Distributed Denial of Service) Attack | An attack which attempts to block access to and use of a resource. |
| Encryption key | The secret number value used by a symmetric encryption algorithm to control the encryption and decryption process. |
| Firewall | A security tool, which may be a hardware or software solution that is used to filter network traffic. |
| Keylogger | Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard. |
| Malware | Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system. |
| Outsourcing | The action of obtaining services from an external entity. |
| PaaS (Platform-as-a-Service) | A type of cloud computing service where the provider offers the customer the ability to operate custom code or applications. |
| Patch | patch |
| Phishing | A social engineering attack that attempts to collect information from victims. |
| Ransomware | A form of malware that holds a victim's data hostage on their computer typically through robust encryption. |
| SaaS (Software-as-a-Service) | A type of cloud computing service where the provider offers the customer the ability to use a provided application. |
| Sandboxing | A means of isolating applications, code or entire operating systems in order to perform testing or evaluation. |
| Social engineering | This type of attack is psychological and aims to either gain access to information or to a logical or physical environment. |
| SPAM | A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. |
| Two-factor authentication | The means of proving identity using two authentication factors usually considered stronger than any single factor authentication. |