Country/Region

The Cyber Security Glossary

Explore all essential cyber security terms in one place.

A

Access Control

A security technique used to ensure that only authorized users can access certain resources or data.

Advanced Persistent Threat (APT

A prolonged and targeted cyberattack in which an intruder gains and maintains access to a network over a long period of time.

Adversary

An entity (individual, group, or nation-state) that is attempting to gain unauthorized access to systems or networks for malicious purposes.

Adware

Software that automatically displays or downloads advertising material when a user is online.

Agentic AI

Artificial intelligence that acts autonomously or with minimal human intervention, often used in cybersecurity to detect and respond to threats.

Antivirus

Software designed to detect and remove malicious software from a computer system.

Attack Surface

The total number of vulnerabilities that can be exploited by attackers within a system or network.

Authentication

The process of verifying the identity of a user, device or system.

Authorization

The process of granting or denying access to resources based on an authenticated identity.

B

Backdoor

A method of bypassing normal authentication to gain access to a system or network.

Backup

A copy of important data or files stored separately to ensure recovery in the event of a data loss.

Behavior Assessments

The process of analyzing and evaluating user behavior to identify risks or vulnerabilities within an organization’s systems.

Botnet

A network of infected computers (bots) that are controlled remotely to carry out cyberattacks, such as DDoS attacks.

Breach

The unauthorized access or acquisition of data from a system, often leading to exposure of sensitive information.

Brute Force Attack

A type of attack where an attacker tries all possible combinations to crack a password or encryption.

Read more

BYOD (Bring Your Own Device)

A policy allowing employees to use their personal devices (smartphones, tablets, etc.) for work-related tasks

C

Call Back Phishing

A form of phishing where attackers impersonate legitimate entities and ask victims to call a phone number, which is controlled by the attacker, to steal sensitive information.

Read more

Chainlink Phishing

A type of phishing attack where malicious actors use social engineering to trick victims into clicking links that lead to fake websites or install malware.

Read more

CIA Triad

A widely accepted model in cybersecurity consisting of confidentiality, integrity, and availability, which represents the core principles of information security.

Clickfix Scam

A fraudulent tactic where attackers convince victims to click on a link or download a file by posing as a legitimate service or tool that offers to fix problems or enhance security.

Cloud Security

The measures and technologies used to protect data, applications, and services stored in the cloud.

Read more

Credential

A set of user credentials (e.g., username and password) that allow access to a system or network.

Read more

Cryptography

The practice of securing information by transforming it into unreadable formats that can only be decrypted by authorized users.

Cyber Attack

A deliberate attempt to compromise the integrity, confidentiality, or availability of a computer system, network, or data.

Cyber Resilience

The ability of an organization to continue operating despite experiencing cyberattacks or failures, ensuring minimal disruption and rapid recovery.

Read more

Cyber Scam

A fraudulent scheme conducted online, typically through deceptive websites, emails, or social media, designed to steal money, personal information, or access to sensitive data.

Read more

Cyber Security

The practice of protecting systems, networks, and programs from digital attacks, theft, and damage.

Cyber Security Awareness

The understanding and knowledge of potential cyber threats and best practices to protect systems, data and personal information from malicious attacks.

Read more

Cyber Security Awareness Month

An annual event in October to raise awareness about the importance of cyber security and promote safe online behaviors among individuals and organizations.

Read more

Cyber Security Behavior

The actions and practices that employees and users adopt concerning cyber security, which can directly affect the risk profile of the organization.

Read more

Cyber Security Culture

The collective attitudes, values, and practices related to cyber security within an organization, influencing how employees and stakeholders approach security.

Read more

D

Dark Web

A part of the internet that is not indexed by search engines, often used for illicit activities including the sale of stolen data.

Data Encryption

The process of converting data into a coded format to prevent unauthorized access.

Data Leak

The unintended or unauthorized exposure of sensitive data to the public or unauthorized parties.

Data Loss Prevention (DLP)

A strategy to ensure sensitive or critical data is not lost, misused, or accessed by unauthorized users.

Data Privacy & Protection

The practice of safeguarding personal and sensitive data from unauthorized access, loss, or misuse, ensuring compliance with laws and regulations.

Read more

DDoS (Distributed Denial-of-Service)

An attack where multiple systems are used to flood a target system with traffic, making it unavailable to users.

Read more

Decryption

The process of converting encrypted data back into its original form.

Deepfake

A type of synthetic media where AI is used to manipulate videos, audio, or images to create realistic but fake content, often used for impersonation or misinformation campaigns.

Read more

Digital Arrest

A type of cyber scam where criminals pretend to be law enforcement, threatening victims with arrest or legal consequences unless they transfer money or reveal personal information.

DNS Spoofing

A type of cyberattack where an attacker manipulates DNS records to redirect traffic to malicious websites.

DoubleClick Jacking

A type of cyber attack where an attacker tricks a user into unknowingly clicking on two hidden or disguised elements, usually leading to unintended actions or security breaches.

Read more

DPDP (Digital Personal Data Protection) Act

Enforced by India, this act regulates how personal digital data is processed, balancing individuals' right to protect their data with the need to use it for legal purposes.

Read more

E

Email Bombing

Email bombing is a form of cyber attack where a target’s email inbox is flooded with a massive volume of unsolicited emails, often disrupting normal operations or overwhelming the recipient’s system.

Read more

Email Security

The use of technology and policies to protect email communications from phishing, malware, and other threats.

Encryption

A technique used to secure data by converting it into an unreadable format, which can only be reverted to its original state by authorized parties.

Endpoint Security

Security measures taken to protect devices (endpoints) like computers, smartphones, and other network-connected devices.

Exfiltration

The unauthorized transfer of data from a system or network.

Exploit

A piece of software or code that takes advantage of a vulnerability in a system to cause unintended behavior or damage.

F

Firewall

A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Firmware

Specialized software stored on hardware devices that controls the device’s operations.

G

Gamified Cyber Security Training

An interactive training approach that uses game elements, such as rewards and challenges, to engage users in learning about cyber security practices and risks.

Read more

Gateway

A network device that acts as a bridge between two networks, often providing security features such as firewall protection.

GDPR (General Data Protection Regulation)

A regulation in EU law that governs data protection and privacy for all individuals within the European Union and the European Economic Area, emphasizing individuals' control over their personal data.

Read more

Grey Hat Hacker

A hacker who may violate ethical standards but does not have malicious intent, often seeking to improve security systems.

H

Hacker

An individual who uses their technical skills to gain unauthorized access to systems and networks, often for malicious purposes.

Hacking

The act of gaining unauthorized access to systems or networks for various purposes, including stealing information or disrupting operations.

Hashing

A process of converting data into a fixed-size string of characters (hash), commonly used in data security and integrity checks.

HIPAA Compliance

The process of adhering to the Health Insurance Portability and Accountability Act, ensuring the privacy and security of health information.

Honeypot

A decoy system or network set up to attract attackers and monitor their activities to learn about their tactics.

Human Error

Mistakes made by individuals that can lead to security breaches, such as sending an email to the wrong person or failing to follow security protocols

Read more

I

Identity Theft

The fraudulent acquisition and use of someone’s personal information, typically for financial gain.

Impersonation

A social engineering tactic in which an attacker pretends to be a legitimate person or organization.

Incident

Any event or action that threatens the security, confidentiality, integrity, or availability of an information system.

Incident Response

A set of procedures used to detect, respond to, and recover from cyber security incidents.

Insider Threat

A security threat that originates from within the organization, often by employees or contractors with authorized access.

Read more

Intrusion Detection System (IDS)

A system that monitors network or system activities for malicious activities or violations of policies.

Intrusion Prevention System (IPS)

A system that not only detects but also actively prevents and blocks potential security threats.

IP Spoofing

A technique used by attackers to disguise their identity by modifying the source address of their packets to appear as though they come from a trusted source.

ISO 27001

An international standard that outlines requirements for an information security management system (ISMS) to manage sensitive company information, ensuring its confidentiality, integrity and availability.

Read more

J

Juice Jacking

A type of cyber attack where malicious actors infect USB charging stations to steal data from or install malware on a connected device, such as a smartphone.

K

Keylogger

A type of malicious software that records keystrokes to gather sensitive information such as usernames and passwords.

L

Lateral Movement

The techniques used by attackers to move within a network after gaining initial access.

LDAP (Lightweight Directory Access Protocol)

A protocol used for accessing and maintaining directory services, commonly used for managing user credentials and permissions.

Least Privilege

A security principle that ensures users and systems only have the minimum level of access necessary to perform their tasks.

M

Malware

Malicious software designed to harm, exploit, or otherwise compromise a computer system.

Man-in-the-Middle (MITM) Attack

A type of attack where an attacker intercepts communication between two parties to eavesdrop or manipulate data.

MFA Bypass

MFA bypass is the process of circumventing Multi-Factor Authentication (MFA) mechanisms, typically through exploiting vulnerabilities or using deceptive techniques, to gain unauthorized access to systems or accounts.

Read more

Micro Learning

A learning strategy involving small, bite-sized lessons, often delivered in quick, on-demand formats like videos or articles, which is effective for cyber security training to raise awareness on specific threats.

Misconfiguration

The improper setup of system or network settings that create vulnerabilities, which can be exploited by attackers (e.g., open cloud storage or default credentials).

Mobile Device Management (MDM)

A strategy and software for managing, securing, and enforcing policies on mobile devices within an organization.

Multi-factor Authentication (MFA)

A security method requiring two or more forms of verification to authenticate a user’s identity.

N

Network Security

Measures taken to protect the integrity, confidentiality, and availability of computer networks and data.

Network Segmentation

The practice of dividing a computer network into smaller sub-networks to improve performance and security.

NIST (National Institute of Standards and Technology)

A U.S. federal agency that develops cybersecurity standards and best practices.

NSA (National Security Agency)

A U.S. government agency responsible for signals intelligence and information assurance.

O

OAuth

An open standard for token-based authentication and authorization, allowing third-party services to access user resources without sharing credentials.

OpenSSL

A software library used to implement SSL and TLS protocols for securing communications over networks.

OSINT (Open-Source Intelligence)

The process of collecting publicly available data and information from open sources to support intelligence activities.

P

Password Spraying

A cyber attack technique where attackers attempt to gain access to multiple accounts by using a small set of commonly used passwords across many usernames, rather than targeting a single account with many different passwords.

Read more

Patch Management

The process of identifying, testing, and applying patches to fix vulnerabilities in software and systems.

PCI DSS (Payment Card Industry Data Security Standard)

A set of security standards designed to protect card payment information and ensure safe handling of credit card data by businesses.

Penetration Testing

A simulated cyber attack conducted by cyber security professionals to identify and exploit vulnerabilities in a system.

Personally Identifiable Information (PII)

Any data that can be used to identify an individual, including name, email, phone number and social security number.

Read more

PHIPA Compliance (Personal Health Information Protection Act)

Legislation that governs the collection, use, and disclosure of personal health information in Ontario, Canada, and requires organizations to secure health-related data.

Phishing

A social engineering attack designed to trick users into revealing sensitive information, usually through fraudulent emails or websites.

Read more

Phishing Tests

Phishing tests are simulated attacks designed to assess an organization's susceptibility to phishing scams by evaluating how employees respond to fake email, website or message-based threats.

Precision Validated Phishing

A targeted phishing attack that uses highly customized or validated information about the victim to increase the likelihood of success.

Read more

Privilege Escalation

The process of gaining higher-level permissions or access rights than initially granted in a system.

Privileged Access Management (PAM)

The practice of securing, managing, and monitoring access to sensitive systems and data.

Q

Quantum Computing

A rapidly evolving field of computing that uses quantum-mechanical phenomena, such as superposition and entanglement, to perform complex calculations at speeds far beyond traditional computers. It poses potential security risks as it could eventually break current encryption methods.

Quishing

A form of phishing using QR codes, where attackers embed malicious links in QR codes to trick users into revealing personal information or downloading malware.

R

Ransomware

A type of malware that encrypts a user’s files and demands payment (ransom) to restore access.

S

Security Awareness Training

Programs aimed at educating employees about potential cybersecurity threats and how to prevent or respond to them.

Read more

SEO Poisoning

A malicious technique where attackers manipulate search engine optimization (SEO) tactics to rank harmful or misleading content higher in search results, often leading users to phishing sites or malware.

Read more

SIEM (Security Information and Event Management)

A system that provides real-time analysis of security alerts generated by applications and network hardware.

Smishing

A form of phishing attack that uses SMS or text messages to trick individuals into revealing personal information or downloading malware.

SOC (Security Operations Centre)

A centralized team responsible for monitoring, detecting, and responding to security incidents within an organization.

Social Engineering

A manipulation technique used by attackers to deceive people into divulging confidential information or performing certain actions.

Spear Phishing

A targeted form of phishing attack in which attackers personalize emails or messages to deceive specific individuals or organizations into disclosing sensitive information.

Spoofing

The act of disguising communication from an unknown source to appear as if it is from a trusted source.

Spyware

A type of malware that secretly monitors and collects information about a user's activities without their knowledge.

SQL Injection

A code injection technique that exploits vulnerabilities in a web application’s database query structure, allowing attackers to manipulate or retrieve data.

Steganography

The practice of concealing data within another file, such as embedding hidden messages in images or audio files, to evade detection.

Read more

Supply Chain Attacks

Cyber attacks that target vulnerabilities in an organization's supply chain to compromise the integrity or security of the goods or services provided.

Read more

Syncjacking

Syncjacking is a cyber attack where an attacker intercepts and manipulates the synchronization process between devices or services to gain unauthorized access or control.

Read more

T

Threat

Any potential danger to an organization’s data, systems, or networks, including cyber attacks, natural disasters, or insider threats.

Read more

Threat Intelligence

The process of gathering, analyzing, and sharing information about potential or actual cyber threats to improve an organization's security.

Trojan Horse (Trojan)

A type of malicious software that disguises itself as legitimate software but performs harmful actions once executed.

Two-factor Authentication (2FA)

A method of authentication requiring two forms of identification before granting access to an account or system.

U

Uptime

The amount of time a system or service has been running without failure or downtime.

URL Spoofing

A technique used to deceive users by creating fake URLs that closely resemble legitimate websites.

User Authentication

The process of verifying the identity of a user through credentials such as a password, token, or biometric scan.

V

Virus

A type of malware that attaches itself to files or programs and spreads by replicating itself.

Vishing

A type of phishing attack carried out over the phone, where attackers impersonate legitimate organizations or individuals to steal sensitive information.

VPN (Virtual Private Network)

A technology that creates a secure, encrypted connection over a less-secure network, such as the internet, to protect data and privacy.

Vulnerability

A weakness in a system that can be exploited by attackers to gain unauthorized access or cause damage.

W

Web Skimming

Web skimming is a type of cyber attack where malicious scripts are injected into websites to steal sensitive customer data, such as credit card information, during online transactions.

Read more

Whaling

A specific type of spear phishing that targets high-profile individuals (e.g., executives) within an organization, with the goal of stealing sensitive corporate information.

Whitelisting

A security practice where only approved applications or users are allowed access to a system or network.

Worm

A type of self-replicating malware that spreads across networks without needing to attach itself to other files.

WPA3 (Wi-Fi Protected Access 3)

A security protocol for securing wireless networks, designed to provide stronger encryption than previous versions.

X

XSS (Cross-Site Scripting)

A type of vulnerability in web applications that allows attackers to inject malicious scripts into webpages viewed by other users.

Z

Zero-Day

A vulnerability that is unknown to the vendor or developer and has no patch or fix available, often exploited by attackers before discovery.

Zero-Trust

Zero Trust is a security framework that assumes no user or device, whether inside or outside the network, should be trusted by default and requires continuous verification of identities and access permissions.

Read more

Book a Free Demo

Reduce human cyber and compliance risks with targeted training.

Get a guided walkthrough — at a time that suits your timezone.

Book a Free Demo
Book a demo