Cyber Security
May 26, 2023 2023-05-26 7:21- Home
- Glossary: Cyber Security
Anti-malware/Antivirus
A programme that keeps an eye on a computer for the most common forms of harmful code and stops, gets rid of, or neutralises the code to stop it from doing any harm.
Breach
The deliberate or accidental disclosure of secure data to a hostile environment. “Unintentional disclosure,” “data leak,” and “data spill” are additional words that are utilised.
Credentials
A user’s authentication information, which is typically your username and password, is required to access the service or network.
Drive-By Download
The unintentional installation of malicious code. This can happen simply by visiting an infected website and not clicking on a link, downloading something, or opening an attachment.
Encrypted
Putting data into an unreadable format using a secret key to restrict access to the information. Knowing the secret key is required in order to read encrypted data.
Firewall
A tool or programme that regulates network and/or information system traffic based on a set of guidelines for approved or permitted access.
Guest network
You can temporarily let guests use your home’s Wi-Fi by setting up a guest network. They can access the internet, but not other computers or devices connected to your home network. Rather than providing your Wi-Fi password, set up a guest network.
HTTPS
Between your device and the computer on the other end is a secure internet connection known as HTTPS. An HTTPS link adds an additional layer of security but does not imply that a website is trustworthy or safe. Never send money or other confidential information over an insecure connection.
Identifiable Information
Information that can be used to identify a specific person, such as their SSN, mailing or email address, phone number, login ID, or image, is known as personally identifiable information.
Keylogging
The act of secretly recording keystrokes made on a keyboard, including login details and other private data. The majority of keystroke tracking is accomplished using a Trojan Horse, a type of software that hides on your computer and runs unnoticed.
Malware
An umbrella word for malicious software. It refers to a wide range of programmes that a hacker can employ to harm, steal from, or take control of individual devices or whole networks.
Network Resilience
Network resilience is the capacity of a network to continue operating in the face of disruptions or damage, to efficiently recover from failures, and to scale to meet high or erratic demand.
Vulnerability
A vulnerability is any flaw in a computer system’s hardware, software, or both that could allow a hacker to enter the system without authorization.
Worm
A single piece of malware that replicates and spreads itself in order to infect other computers. They do not require user activity to be initiated, unlike viruses.
Cross-Site Scripting
Cross-Site Scripting is a security flaw in web applications that lets attackers insert client-side scripts into pages that other people are seeing. Access controls may be evaded via XSS attacks.
Zero Day Exploit
A computer attack that exploits a security weakness before the flaw is identified. The developer has no time to prepare for the breach and must act swiftly to produce a remedy to prevent harm because the security flaw is unknown until the attack takes place.