Navigate the world of cybersecurity with ease! This glossary of 100 essential terms simplifies the jargon, helping you understand the concepts that protect your online world. Let’s get started!
Access control is a security method that ensures only authorized users can access data, systems, or resources. It is often implemented through user credentials like passwords, biometrics, or access cards and is designed to prevent unauthorized individuals from gaining access.
A company uses a role-based access control system. E.Employees in the HR department can view employee records, but IT staff can only access technical configurations.
A type of software that automatically displays advertisements on a computer or device. While not always malicious, adware often generates intrusive ads, redirects users to promotional websites, or collects browsing data for targeted marketing, which can compromise user experience and privacy.
A user installs a free video player and notices frequent pop-up ads and new browser toolbars that redirect searches to ad-heavy pages.
A prolonged and highly targeted cyberattack where attackers gain unauthorized access to a system and remain undetected for an extended period. APTs are often used to steal sensitive data, such as intellectual property or government secrets, and are executed by organized groups or nation-states.
In the 2015 attack on the U.S. Office of Personnel Management, hackers gained unauthorized access to millions of government employee records over several months.
Software designed to detect, prevent, and remove malicious software (malware) from a computer or device. Antivirus programs use signature-based detection to recognize known threats and heuristic analysis to identify suspicious behaviors.
A user’s antivirus software scans their computer and identifies a malicious file disguised as a legitimate PDF, prompting the user to delete it.
The process of verifying the identity of a user or device before granting access to systems or resources. Common authentication methods include passwords, biometric scans, security tokens, and one-time codes sent via SMS.
To access a banking app, a user must enter their PIN and use their fingerprint to verify their identity.
The process of determining and granting permissions to a user or system after their identity has been authenticated. Authorization ensures users can only access resources and perform actions they are allowed to, based on their role or access level.
An employee logs into the company’s cloud system and is only able to view files relevant to their department, while administrative controls are restricted.
The practice of creating duplicate copies of data and storing them in separate locations to recover information in the event of data loss caused by hardware failures, cyberattacks, or accidental deletions. Backups are crucial for maintaining business continuity and disaster recovery.
A small business schedules nightly backups of their customer database to an offsite cloud server to ensure data is secure and easily restorable.
A network of compromised devices, such as computers or IoT devices, that are controlled remotely by a hacker without the owners' knowledge. Botnets are often used to execute large-scale cyberattacks, such as distributed denial-of-service (DDoS) attacks, send spam emails, or mine cryptocurrency.
A user’s outdated smart camera is infected with malware and unknowingly becomes part of a botnet that launches a DDoS attack against a popular gaming website.
A method of hacking where an attacker systematically tries every possible combination of characters until the correct password or encryption key is found. Brute force attacks are time-consuming but can be effective if passwords are weak or unencrypted.
An attacker uses a brute force tool to try thousands of common passwords on a victim’s email account, eventually gaining access with the password “password123.”
A trusted organization that issues digital certificates to verify the authenticity of websites, individuals, or organizations. These certificates enable secure communication by encrypting data transmitted over the internet, commonly seen in HTTPS connections.
A website owner uses a Certificate Authority like DigiCert or Let’s Encrypt to obtain an SSL certificate, ensuring users see a padlock icon in the browser and secure HTTPS connections when visiting the site.
An algorithm used to encrypt and decrypt data, ensuring that only authorized parties can read or process the information. Ciphers form the foundation of cryptographic techniques and are used to secure communications, protect sensitive data, and validate the integrity of information. Common cipher types include symmetric ciphers, where the same key is used for encryption and decryption, and asymmetric ciphers, which use a pair of public and private keys.
The Advanced Encryption Standard (AES) cipher encrypts sensitive files stored on a laptop, ensuring they remain unreadable without the correct decryption key.
A set of practices, technologies, and policies designed to protect data, applications, and infrastructure hosted in the cloud from unauthorized access, breaches, or cyberattacks. Cloud security includes encryption, access controls, multi-factor authentication, and regular monitoring to maintain the confidentiality, integrity, and availability of cloud-hosted resources.
A company storing its customer data in Amazon Web Services (AWS) uses encryption for stored files, a firewall for network traffic, and regular audits to secure sensitive information.
A small piece of data that a website stores on a user’s computer to enhance their browsing experience. Cookies can store preferences, login credentials, or session details and are categorized as either first-party (set by the website) or third-party (used for tracking and advertising purposes). While cookies improve usability, they can also pose privacy concerns if misused.
An e-commerce website stores a cookie on a user’s device to keep their shopping cart intact even after they leave and return later.
A type of cyberattack where stolen usernames and passwords from one site are used to gain unauthorized access to accounts on other platforms. Attackers exploit users who reuse the same login credentials across multiple services. Credential stuffing attacks are automated and can lead to significant data breaches or account takeovers.
Hackers obtain login credentials from a data breach on a social media platform and use them to access users’ email or banking accounts with similar passwords.
The science of securing information by transforming it into an unreadable format using mathematical algorithms. Cryptography ensures the confidentiality, authenticity, and integrity of data, preventing unauthorized parties from accessing or altering it. Common techniques include encryption, hashing, and digital signatures.
An online banking platform encrypts transaction data using public-key cryptography to protect it from interception during transmission.
The set of regular practices and behaviors that individuals and organizations follow to maintain a secure digital environment. Cyber hygiene includes updating software, using strong passwords, enabling multi-factor authentication, and avoiding suspicious links. These proactive measures reduce vulnerabilities and protect against cyber threats.
A company implements a weekly schedule for employees to change their passwords and updates all systems with the latest security patches.
Any potential activity, event, or action that could compromise the confidentiality, integrity, or availability of a system, network, or data. Cyber threats can originate from malicious actors, such as hackers or nation-states, or from unintentional errors like misconfigured systems.
A phishing email tricking an employee into clicking a malicious link poses a cyber threat to the organization’s network.
A data breach is an incident in which unauthorized individuals gain access to sensitive, confidential, or protected data. It can result from hacking, weak security measures, or insider threats and can lead to the exposure of personal information, financial loss, and reputational damage.
A data breach at a healthcare provider exposes patients’ medical records and personal details, compromising their privacy.
Encryption is the process of converting data into a secure, unreadable format to protect it from unauthorized access. It ensures that even if data is intercepted or stolen, it remains inaccessible without the proper decryption key. Encryption is widely used in email communication, online transactions, and secure file storage.
A messaging app like WhatsApp uses end-to-end encryption to ensure that only the sender and recipient can read the messages.
Data leaks are the unintentional exposure or sharing of sensitive information with unauthorized individuals. Unlike data breaches, which are deliberate attacks, data leaks typically occur due to human error, misconfigured settings, or inadequate security protocols.
An employee accidentally uploads a sensitive company document to a public folder in a cloud storage service, making it accessible to anyone with the link.
Decryption is the process of converting encrypted data back to its original, readable form using a specific decryption key or algorithm. It is the reverse of encryption and ensures that only authorized parties can access the data. Decryption is widely used in secure communications, digital transactions, and data protection.
When you receive an encrypted email, your email client uses the private decryption key to convert the message back into plain text, allowing you to read it.
A Denial of Service (DoS) attack is a malicious attempt to make a network, service, or website unavailable to users by overwhelming it with excessive traffic. This type of attack disrupts the normal functioning of the target, causing downtime and preventing legitimate access.
A hacker sends an overwhelming number of connection requests to an e-commerce website’s server, causing it to crash and rendering the site inaccessible to customers during a sale.
Detection and Response refers to the tools, processes, and strategies used to identify cybersecurity threats and respond to them effectively. It includes monitoring systems for unusual behavior, analyzing alerts, and implementing incident response plans to mitigate the impact of attacks.
A Security Information and Event Management (SIEM) system detects unauthorized login attempts on a company’s network and triggers an alert for the IT team to investigate and take action.
A digital signature is a cryptographic method used to verify the authenticity and integrity of a digital message, file, or document. It ensures that the content has not been tampered with and confirms the identity of the sender. Digital signatures are widely used in secure communications and electronic transactions.
When signing an online contract, the sender’s private key generates a digital signature, and the recipient verifies its authenticity using the sender’s public key.
A Distributed Denial of Service (DDoS) attack is a more complex version of a DoS attack, where multiple compromised devices, often part of a botnet, are used to flood the target with traffic. This makes the attack harder to stop and more devastating to the target’s services.
A hacker uses a botnet of thousands of infected computers worldwide to flood a streaming service with fake requests, causing buffering issues and downtime for legitimate users.
Domain spoofing is a type of cyberattack where attackers impersonate a legitimate domain to trick users into believing they are interacting with a trusted entity. This technique is often used in phishing scams, where attackers send fake emails or create look-alike websites to steal sensitive information.
A user receives an email appearing to be from "paypal-support.com" instead of the official "paypal.com," urging them to reset their password on a fake login page.
DNS poisoning, also known as DNS spoofing, is a technique where attackers corrupt the Domain Name System (DNS) to redirect users from legitimate websites to malicious ones. This type of attack can be used to steal sensitive information or distribute malware.
A user tries to visit their bank’s website, but a poisoned DNS entry redirects them to a fake site that looks identical, prompting them to enter their login credentials, which are then stolen.
A drive-by download occurs when malicious software is automatically downloaded and installed onto a user’s device without their knowledge or consent. This usually happens when visiting a compromised or malicious website. The malware may exploit vulnerabilities in the user’s browser or operating system.
A user visits a website with outdated security and unknowingly downloads malware that captures their keystrokes and sends them to a remote attacker.
An endpoint is any device that connects to a network and serves as a point of entry or exit for data. Endpoints include computers, smartphones, tablets, servers, and Internet of Things (IoT) devices. Protecting endpoints is critical to securing the overall network.
A company deploys endpoint protection software on all employee laptops to monitor and block malware, unauthorized access, and suspicious activity.
Endpoint security refers to the measures and tools implemented to protect devices like computers, smartphones, tablets, and servers that connect to a network. Since endpoints serve as entry points to a network, they are vulnerable to malware, phishing, ransomware, and other attacks. Endpoint security solutions include antivirus software, firewalls, device encryption, and endpoint detection and response (EDR) systems.
A company uses endpoint security software on employee laptops to block malicious downloads, monitor for unusual activity, and ensure only authorized applications can run.
An exploit is a method or code that attackers use to take advantage of a vulnerability in a system, software, or network. Exploits can allow unauthorized access, data theft, or system control. Vulnerabilities often arise due to unpatched software, misconfigurations, or design flaws, and attackers exploit them to compromise systems.
A hacker discovers a vulnerability in an outdated version of a web application and uses an exploit to inject malicious SQL queries, gaining unauthorized access to the database.
A firewall is a security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls act as a barrier between a trusted internal network and untrusted external networks, blocking unauthorized access and malicious traffic while allowing legitimate communication.
A home router with a built-in firewall blocks unsolicited incoming traffic from the internet to prevent hackers from accessing connected devices.
Cybersecurity forensics is the investigation and analysis of digital evidence related to a cybersecurity incident. The goal of forensics is to determine the cause, extent, and impact of an attack, identify the attackers, and recover any affected data. Forensic investigations often involve analyzing logs, files, and systems to trace the origin of the attack.
After a ransomware attack, a forensic team examines server logs and malware behavior to determine how the attackers infiltrated the network and whether sensitive data was exfiltrated.
A honeypot is a decoy system or network set up to attract cyber attackers and study their techniques. Honeypots mimic real systems but contain no valuable data, allowing security teams to monitor and analyze attack patterns, malware behavior, and intrusion tactics without risking actual assets.
A cybersecurity team deploys a honeypot that simulates an e-commerce website. Attackers target it with SQL injection attacks, revealing their methods and helping the team strengthen the security of the real website.
Identity theft occurs when someone steals another person’s personal information, such as Social Security numbers, credit card details, or login credentials, to commit fraud or other malicious activities. The stolen identity can be used to make purchases, open accounts, or access sensitive information without the victim’s consent.
A criminal obtains a victim’s credit card information through a phishing email and uses it to make unauthorized online purchases.
Incident response is the process of identifying, addressing, and managing a cybersecurity incident to minimize damage, recover systems, and prevent future attacks. It involves detecting the incident, containing the threat, investigating its cause, and implementing corrective measures. An incident response plan ensures a swift and organized response to breaches.
After detecting unusual login attempts on their servers, a company’s incident response team isolates the affected systems, identifies the attack vector, and applies patches to prevent further exploitation.
An insider threat is a security risk posed by someone within an organization, such as an employee, contractor, or business partner. Insider threats can be intentional, such as data theft or sabotage, or unintentional, such as accidental sharing of sensitive information.
An employee with access to sensitive financial data copies the information to a personal USB drive and sells it to a competitor.
An Intrusion Detection System (IDS) is a tool or software that monitors network traffic for suspicious activities or known attack patterns. Unlike firewalls, IDS does not block traffic but alerts administrators to potential threats. It can be signature-based (matching known attack patterns) or anomaly-based (detecting unusual behavior).
An IDS detects a sudden spike in failed login attempts on a server and sends an alert to the security team for further investigation.
An Intrusion Prevention System (IPS) is an advanced version of an IDS that not only detects suspicious activities but also takes proactive measures to block them. An IPS can drop malicious packets, block traffic from suspicious IP addresses, and prevent attacks like SQL injection or buffer overflows.
A web application firewall with IPS capabilities detects and blocks an attempt to exploit a known vulnerability in the application before any harm is done.
IoT Security refers to the practices and technologies designed to safeguard Internet of Things (IoT) devices, such as smart home systems, wearable devices, and industrial sensors, from cyber threats. IoT devices are often vulnerable to attacks due to weak default settings, lack of regular updates, and limited built-in security. Effective IoT security includes strong authentication, data encryption, firmware updates, and network monitoring.
A smart thermostat in a home network is secured using a strong password and regularly updated firmware to prevent hackers from using it as a gateway to access other connected devices.
A keylogger is a type of malware or software designed to record every keystroke made on a device. Cybercriminals use keyloggers to capture sensitive information like passwords, credit card numbers, or private messages. Keyloggers can be hardware-based (physical devices plugged into keyboards) or software-based.
A user unknowingly downloads a keylogger hidden in a malicious email attachment. The malware records their login credentials when they access their online banking account, which the attacker later uses to steal funds.
Malware, short for malicious software, is any program or file designed to harm, exploit, or disrupt systems, networks, or devices. Common types of malware include viruses, worms, trojans, ransomware, spyware, and adware. Malware is typically delivered through phishing emails, malicious websites, or infected downloads.
A user downloads a free game from an untrusted website, which installs a trojan on their computer. The trojan gives attackers remote access to the system to steal data or plant additional malware.
A Man-in-the-Middle (MitM) attack occurs when an attacker intercepts and alters communication between two parties without their knowledge. This type of attack is often used to steal sensitive information, such as login credentials or financial data, by eavesdropping or impersonating one of the parties.
While using public Wi-Fi at a coffee shop, a user logs into their email. An attacker on the same network intercepts their data, capturing their login credentials through a MitM attack.
Multi-factor authentication (MFA) is a security measure that requires users to verify their identity using multiple methods before granting access. These methods typically include something the user knows (password), something they have (security token or phone), and something they are (biometric verification). MFA adds an extra layer of security by making it harder for attackers to gain access.
A banking app requires a user to log in with their password and then enter a one-time code sent to their registered mobile number.
Network security encompasses policies, practices, and technologies to protect a computer network from unauthorized access, attacks, and disruptions. It involves measures like firewalls, intrusion detection systems (IDS), encryption, and regular monitoring to ensure network resources' confidentiality, integrity, and availability.
A corporate network is secured using a firewall to filter traffic, a VPN for remote access, and monitoring tools to detect and respond to suspicious activity.
A patch is a software update released by developers to fix vulnerabilities, bugs, or performance issues in a program. Patches are critical for maintaining security, as attackers can exploit unpatched software to gain unauthorized access or control.
After a security vulnerability is discovered in a popular operating system, the developer releases a patch to prevent hackers from exploiting the flaw. Users who update their systems are protected, while those who delay remain at risk.
Penetration testing, or pen testing, is the practice of simulating cyberattacks on a system, application, or network to identify vulnerabilities and assess security defenses. Ethical hackers, known as penetration testers, use real-world attack methods to uncover weaknesses before malicious actors can exploit them.
A financial institution hires a cybersecurity firm to perform a penetration test on its online banking platform. The testers find a vulnerability in the login process, which the institution fixes to prevent potential attacks.
Phishing is a social engineering attack where attackers send fraudulent messages, often posing as legitimate entities, to trick users into revealing sensitive information like passwords, credit card numbers, or personal details. Phishing attempts are commonly delivered via email, text messages, or fake websites.
A user receives an email that appears to be from their bank, asking them to verify their account details by clicking a link. The link leads to a fake website where the user unknowingly enters their login credentials, which are then stolen by the attacker.
Ransomware is a type of malware that encrypts a victim’s files or locks them out of their system. The attacker demands a ransom payment, often in cryptocurrency, in exchange for restoring access to the files or system. Ransomware attacks can disrupt businesses, hospitals, and individuals, causing significant financial and operational damage.
A hospital’s computer network is infected with ransomware through a malicious email attachment. The attackers demand $100,000 in Bitcoin to decrypt the hospital’s patient records, forcing the institution to either pay the ransom or restore systems from backups.
Risk assessment is the process of identifying, analyzing, and evaluating potential risks and vulnerabilities that could harm an organization’s assets, systems, or operations. It helps organizations prioritize threats, allocate resources effectively, and implement strategies to mitigate risks.
A financial institution conducts a risk assessment to identify potential vulnerabilities in its online banking system. The assessment reveals that outdated encryption protocols pose a risk, prompting the organization to update them and strengthen customer data security.
A rootkit is a type of malicious software designed to provide attackers with unauthorized access to a computer or network while remaining hidden. Rootkits operate at a low level in the operating system, making them difficult to detect. They are often used to install additional malware, steal sensitive data, or manipulate system processes.
An attacker infects a server with a rootkit that hides itself from antivirus software. The rootkit allows the attacker to monitor network activity and exfiltrate confidential data without being noticed.
Sandboxing is a security technique used to isolate and analyze potentially harmful programs or files in a controlled environment. By running the suspicious code in a sandbox, organizations can observe its behavior without risking the integrity of their main systems. Sandboxing is commonly used in malware analysis and software testing.
A cybersecurity analyst receives a suspicious email attachment and runs it in a sandbox. The attachment is revealed to contain ransomware, allowing the analyst to study its behavior and block it from infecting the organization’s network.
Scareware is a type of malware that uses fear tactics to trick users into believing their device is infected with viruses or compromised. It often prompts users to purchase fake security software or pay for unnecessary services. Scareware can display alarming pop-ups, fake system scans, or fraudulent error messages.
A user browsing a website encounters a pop-up warning that their computer is infected with multiple viruses. The pop-up urges them to download a "premium antivirus tool," which is malware.
SSL (Secure Socket Layer) is a cryptographic protocol used to encrypt data transmitted over the internet, ensuring secure communication between users and websites. It protects sensitive information, such as login credentials, credit card details, and personal data, from being intercepted by attackers. SSL has been succeeded by the more secure TLS (Transport Layer Security).
When users visit a banking website, they see a padlock icon in the browser’s address bar, indicating that SSL encryption is securing the connection.
Security awareness training educates individuals about cybersecurity best practices and how to recognize and respond to potential threats. This training covers topics such as phishing detection, password hygiene, safe browsing habits, and reporting suspicious activity. It empowers employees and users to serve as a line of defense against cyber threats.
A company holds a security awareness workshop to teach employees how to identify phishing emails, use multi-factor authentication, and report suspicious incidents to the IT department.
Session hijacking is a cyberattack where an attacker takes control of a user’s active session on a website or application. This is typically achieved by stealing session cookies, which are used to authenticate the user. Once the attacker gains access, they can impersonate the user and perform unauthorized actions.
An attacker intercepts a user’s session cookies while they are logged into an online shopping site over an unsecured public Wi-Fi network. The attacker uses the stolen cookies to access the user’s account and make fraudulent purchases.
Social engineering is a tactic used by cybercriminals to manipulate individuals into divulging sensitive information or performing actions that compromise security. Instead of exploiting technical vulnerabilities, attackers exploit human psychology, such as trust, fear, or urgency, to achieve their goals.
An attacker calls an employee pretending to be from the IT department and tricks them into revealing their account password by claiming it's needed for a security update.
A software vulnerability is a flaw, bug, or weakness in a program that can be exploited by attackers to compromise its functionality or security. These vulnerabilities can result from coding errors, design flaws, or misconfigurations. Regular updates and patches are essential to address vulnerabilities.
A hacker exploits a vulnerability in an outdated content management system (CMS) to inject malicious code into a company’s website, redirecting visitors to a phishing site.
Spam refers to unsolicited and often unwanted messages sent in bulk, typically via email, text messages, or instant messaging platforms. While spam is commonly used for advertising, it can also carry malicious links, malware, or phishing attempts, posing a cybersecurity risk to recipients.
A user receives an email offering a fake lottery prize. Clicking on the attached link downloads malware onto their computer, allowing the attacker to steal personal information.
Spear phishing is a highly targeted phishing attack aimed at a specific individual, organization, or group. Unlike general phishing attacks, spear phishing is personalized, often using information about the target to appear legitimate and increase the chances of success. Attackers typically aim to steal sensitive information, such as credentials, financial data, or trade secrets.
A cybercriminal sends a fake email to a company’s CFO, pretending to be the CEO, requesting an urgent wire transfer. The email appears authentic as it uses details like the CEO’s signature and prior correspondence.
Spyware is a type of malware that secretly monitors and collects information about a user’s activities without their consent. It can record browsing history, login credentials, credit card details, and even keystrokes. Spyware often infiltrates systems through malicious downloads, email attachments, or compromised websites.
A user installs a free software program from an untrusted source, unknowingly installing spyware that monitors their online banking activities and sends their login credentials to the attacker.
SQL injection is a cyberattack where attackers exploit vulnerabilities in a web application’s database by injecting malicious SQL code. This attack can allow unauthorized access to sensitive data, modification of database contents, or even deletion of entire databases. SQL injection often targets poorly secured login pages or search fields.
A hacker enters ' OR '1'='1 into a login form's username field, bypassing authentication and gaining unauthorized access to the website's admin panel.
A supply chain attack targets less secure partners, suppliers, or third-party services connected to a larger organization. By compromising these weaker links, attackers gain access to the main target’s network or data. This type of attack is particularly dangerous as it exploits trusted relationships within a supply chain.
In the SolarWinds attack, hackers injected malicious code into a software update of a widely used IT management tool, gaining access to multiple organizations, including government agencies.
Threat intelligence involves collecting, analyzing, and sharing information about potential cyber threats, including indicators of compromise (IoCs), attacker behavior, and vulnerabilities. It helps organizations anticipate, detect, and mitigate threats effectively.
A cybersecurity team monitors threat intelligence feeds and learns about a new ransomware variant targeting specific industries. They use this information to update their defenses and train employees to recognize potential attacks.
Tokenization is a security technique that replaces sensitive data, such as credit card numbers or personal information, with a unique token. The token has no exploitable value outside its specific context, ensuring that the original data remains secure. Tokenization is widely used in payment processing and data storage.
When a customer makes an online purchase, their credit card number is replaced with a token, which is stored by the payment gateway. If attackers breach the database, they cannot use the token to retrieve the original credit card number.
A Trojan horse is a type of malware disguised as legitimate software or files. Once installed, it can perform malicious actions, such as stealing data, installing additional malware, or providing remote access to attackers. Trojans rely on tricking users into executing them.
A user downloads a music player from an unofficial website. The software works as expected but also installs a trojan that allows hackers to access the user’s files and steal personal data.
Two-factor authentication (2FA) is a security measure requiring users to verify their identity using two different forms of verification. This adds an extra layer of protection, making it harder for attackers to access accounts even if they steal a password. Verification methods often include something the user knows (password), something they have (security token), or something they are (biometric data).
A user logs into their email account using a password and then enters a one-time code sent to their mobile phone to complete the login process.
Vishing, or voice phishing, is a type of social engineering attack conducted over the phone. Attackers pose as trusted entities, such as bank representatives, tech support, or government officials, to trick victims into revealing sensitive information like account details or passwords.
A scammer calls a user, claiming to be from their bank’s fraud department, and asks for account details and OTPs to "resolve unauthorized transactions."
A Virtual Private Network (VPN) is a tool that encrypts internet connections to protect users' online privacy and security. VPNs create a secure tunnel between the user’s device and the internet, masking their IP address and encrypting data to prevent interception by attackers or ISPs. VPNs are commonly used for secure remote work, bypassing censorship, and protecting personal data on public Wi-Fi.
A remote employee uses a VPN to securely connect to their company’s internal network while working from a coffee shop, ensuring their data remains private even on public Wi-Fi.
A virus is a type of malicious software (malware) that can replicate itself and infect other files or devices. Viruses often attach to legitimate programs or files and spread when those programs are executed. Once activated, a virus can cause various harmful effects, such as corrupting files, stealing data, or damaging systems. Unlike worms, viruses require user action, such as running an infected file, to spread.
A user downloads a game from an untrusted website, which contains a virus. When the game is run, the virus replicates and corrupts essential system files, causing the computer to crash repeatedly.
A vulnerability is a weakness or flaw in a system, application, or network that can be exploited by attackers to compromise security. Vulnerabilities can result from coding errors, misconfigurations, outdated software, or inadequate security measures. Identifying and patching vulnerabilities is critical to preventing exploitation.
A popular web browser contains a vulnerability that allows attackers to bypass its security sandbox, enabling them to execute malicious code on the user’s device. The developers released a patch to fix the issue, but unpatched systems remain at risk.
A Web Application Firewall (WAF) is a security tool designed to protect web applications from common threats and attacks, such as SQL injection, cross-site scripting (XSS), and DDoS attacks. WAFs monitor and filter HTTP traffic to detect and block malicious activity while allowing legitimate requests to pass through.
An e-commerce website deploys a WAF to prevent attackers from injecting malicious SQL queries into the site's database, safeguarding customer data from theft.
A watering hole attack is a targeted cyberattack where attackers compromise a legitimate website frequently visited by the intended victim or group. The attackers inject malicious code into the website, which infects users who visit the site, often without their knowledge. This tactic is used to distribute malware or steal sensitive information.
A cybercriminal group targets employees of a defense company by compromising a popular industry forum. When employees visit the forum, their devices are infected with spyware designed to extract confidential project data.
Whaling is a type of phishing attack that specifically targets high-level executives, such as CEOs, CFOs, or other decision-makers within an organization. These attacks often use personalized messages that appear legitimate, aiming to steal sensitive information, initiate fraudulent financial transactions, or gain access to critical systems.
An attacker sends an email to a company's CEO, pretending to be the legal department, and requests immediate approval for a wire transfer to a "vendor." The email uses the company’s branding and internal details to appear convincing
A white hat hacker, also known as an ethical hacker, is a cybersecurity professional who tests systems, networks, and applications for vulnerabilities with the organization’s permission. White hat hackers use their skills to improve security by identifying and fixing flaws before malicious actors can exploit them.
A white hat hacker performs penetration testing on a bank’s online platform, identifies a vulnerability that could allow unauthorized access, and works with the IT team to patch it.
A worm is a type of malware that can replicate itself and spread across networks without requiring any action from users. Unlike viruses, worms do not attach to files but exploit network vulnerabilities to propagate. Worms can consume bandwidth, overload systems, or deliver additional malware.
The 2001 "Code Red" worm infected over 350,000 servers by exploiting a vulnerability in Microsoft IIS web servers, defacing websites and causing network disruptions worldwide.
A zero-day exploit targets a vulnerability in software or hardware that is unknown to the vendor or the public. Since no patch or fix is available, attackers can use the exploit to carry out attacks before the vulnerability is addressed. Zero-day exploits are highly dangerous and often sold on the dark web.
An attacker discovers a zero-day vulnerability in a popular video conferencing app, allowing them to gain remote access to users' webcams without their knowledge.
Zero Trust Security is a security model that assumes no user, device, or application is inherently trustworthy, even if inside the network perimeter. Access is granted only after strict identity verification and continuous monitoring. This approach minimizes the risk of insider threats and lateral movement of attackers within the network.
A company implementing Zero Trust Security requires employees to authenticate using multi-factor authentication and encrypts all internal communications to prevent unauthorized access.
A zombie is a compromised device that is part of a botnet and controlled remotely by an attacker. These devices are often used to perform malicious activities, such as launching DDoS attacks, sending spam emails, or mining cryptocurrency, without the owner’s knowledge.
An outdated IoT camera is infected with malware and becomes a zombie in a botnet. The attacker uses the botnet to flood a target website with traffic, causing it to crash.
Behavioral analysis is the process of monitoring patterns in user, system, or network behavior to identify anomalies that may indicate a cyber threat. It involves studying baseline activities and detecting deviations that could signify malicious activity, such as unauthorized access, unusual login times, or data transfers. Behavioral analysis is often used in advanced threat detection systems to combat sophisticated attacks.
A security system detects an employee accessing sensitive financial files late at night from an unusual location, triggering an alert. Upon investigation, it is discovered that the employee's account has been compromised by an attacker.
A black hat hacker is an individual who breaches systems or networks illegally with malicious intent. These hackers exploit vulnerabilities for personal gain, such as stealing sensitive data, deploying ransomware, or defacing websites. Black hat hackers are the antithesis of ethical (white hat) hackers, focusing solely on causing harm or benefiting financially.
A black hat hacker infiltrates an e-commerce website, stealing thousands of customers' credit card details and selling them on the dark web.
The blue team is a group of cybersecurity professionals responsible for defending an organization against cyber threats. Their primary focus is to monitor systems, identify vulnerabilities, respond to incidents, and strengthen defenses against potential attacks. They often work alongside a red team, which simulates attacks to test the organization’s defenses.
During a simulated attack by the red team, the blue team detects and blocks unauthorized access attempts to the company's internal database, showcasing the effectiveness of their intrusion detection systems.
Data masking is a technique used to obscure or anonymize sensitive data by replacing it with fictitious but realistic values. This ensures that unauthorized individuals cannot access or misuse the data while maintaining its usability for testing, analysis, or training purposes. Data masking is crucial for protecting customer information in non-production environments.
A healthcare provider masks patient names and Social Security numbers in their training database, replacing them with randomly generated values, ensuring compliance with privacy regulations.
End-to-end encryption is a security method where data is encrypted at its origin and only decrypted at its intended destination. This ensures that the data remains private and cannot be accessed by intermediaries, including service providers or attackers who intercept the communication. It is commonly used in messaging apps, email services, and online transactions.
A messaging app like Signal uses end-to-end encryption, ensuring that only the sender and recipient can read the messages, even if the data is intercepted during transmission.
A false positive occurs when a security system incorrectly identifies normal, legitimate behavior as malicious. While false positives are less harmful than false negatives (missing actual threats), they can overwhelm security teams with unnecessary alerts and distract them from genuine threats.
An intrusion detection system flags a routine software update as a potential attack, prompting the IT team to investigate. After analysis, they confirm it was a harmless activity.
Hashing is the process of converting data, such as a password or file, into a fixed-size string of characters using a mathematical algorithm. The output, called a hash, is unique to the input data and cannot be reversed to retrieve the original information. Hashing is commonly used for verifying data integrity and securely storing passwords.
When a user creates an account, their password is hashed and stored in the database. During login, the entered password is hashed again and compared to the stored hash to verify authenticity.
Incident management is the structured process of detecting, responding to, and resolving cybersecurity incidents to minimize damage and restore normal operations. This involves identifying the nature of the incident, containing the threat, analyzing its impact, and implementing measures to prevent future occurrences.
After detecting ransomware on a server, the incident management team isolates the affected systems, identifies the source of the infection, restores data from backups, and patches vulnerabilities to prevent recurrence.
The kill chain is a model that outlines the stages of a cyberattack, from reconnaissance to data exfiltration. By understanding these stages, organizations can identify where in the chain they can disrupt an attack. The kill chain typically includes phases like reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
An attacker conducts reconnaissance by scanning a company's network for vulnerabilities, delivers a phishing email with a malicious link, and exploits an unpatched vulnerability to install malware. The IT team detects and blocks the attack during the delivery phase.
The principle of least privilege ensures that users, applications, and systems are granted only the minimum level of access necessary to perform their tasks. By limiting access, organizations reduce the risk of accidental or intentional misuse of privileges and minimize the impact of potential security breaches.
An intern at a company is only given access to basic project files, while sensitive financial data and administrative controls are restricted to senior staff.
A logic bomb is a type of malicious code embedded in a system or software that is programmed to execute under specific conditions, such as a particular date, time, or action. Logic bombs are often hidden within legitimate software or systems, making them difficult to detect until they are triggered. The damage caused by a logic bomb can range from deleting files to corrupting databases or crashing systems.
A disgruntled employee embeds a logic bomb in the company's payroll system, set to delete all employee records on a specific date if their credentials are revoked.
Password spraying is a cyberattack technique where attackers attempt to access multiple accounts by using a small number of commonly used passwords across a large set of usernames. Unlike brute force attacks, which target a single account with numerous password attempts, password spraying minimizes the chance of detection by making fewer attempts per account.
An attacker uses a list of usernames obtained from a corporate directory and tries weak passwords like "Password123" or "Welcome2023" across all accounts, hoping to exploit users with poor password practices.
A red team is a group of ethical hackers or cybersecurity professionals tasked with simulating real-world cyberattacks on an organization to identify vulnerabilities in its defenses. Red teams mimic the tactics, techniques, and procedures (TTPs) of malicious actors to test and improve an organization’s security posture.
A red team simulates a phishing attack to gain access to an organization’s internal network, highlighting gaps in employee awareness and email filtering systems.
SIEM refers to a set of tools and processes that collect, monitor, and analyze security-related data from various sources, such as network logs, devices, and applications, to detect and respond to potential threats. SIEM systems provide real-time alerts, threat intelligence, and compliance reporting, helping organizations maintain a robust security posture.
A SIEM system detects an unusual spike in login attempts from a foreign IP address on a company’s server and alerts the IT team, enabling them to block the IP before a breach occurs.
Session timeout is a security feature that automatically terminates a user’s session after a period of inactivity. This prevents unauthorized access in cases where a user leaves their device unattended or forgets to log out. Session timeouts are commonly used in banking apps, e-commerce sites, and corporate systems to enhance security.
A user logs into their online banking account but steps away for 10 minutes without any activity. The system automatically logs them out to protect their account from potential misuse.
Shadow IT refers to IT systems, applications, or devices used within an organization without the knowledge or approval of the IT department. While shadow IT can improve productivity by allowing employees to use preferred tools, it also poses significant security risks, such as data leaks, compliance violations, and unmonitored vulnerabilities.
Employees in a marketing department use a cloud-based file-sharing service to collaborate on projects, bypassing the approved company system. The lack of IT oversight leads to sensitive client data being exposed due to weak security settings.
Smishing, or SMS phishing, is a type of social engineering attack where attackers send fraudulent text messages to trick victims into revealing sensitive information, such as passwords, account details, or payment information. Smishing messages often include a sense of urgency, such as claiming that an account is at risk or a payment is overdue.
A user receives a text message claiming to be from their bank, warning that their account has been locked and providing a link to "unlock" it. The link directs them to a fake login page designed to steal their credentials.
Spoofing is a technique used by attackers to impersonate a legitimate entity, such as an email sender, IP address, or website, to deceive users into trusting the source. Spoofing is often employed in phishing attacks, fake websites, or malware distribution to trick users into divulging sensitive information or performing harmful actions.
An attacker sends an email that appears to come from a company’s HR department, instructing employees to click a link and update their payroll information. The link leads to a fake website designed to steal login credentials.
Threat hunting is the proactive process of searching for signs of hidden or undetected threats within a network or system. Unlike traditional security measures that rely on automated alerts, threat hunting involves manual investigation by skilled analysts who look for unusual behaviors, patterns, or anomalies that could indicate malicious activity.
A threat hunter investigates unusual outbound traffic from a corporate server and discovers malware communicating with an external command-and-control server, preventing a potential data breach.
Typosquatting, also known as URL hijacking, is a cyberattack where attackers create websites with URLs similar to legitimate ones, often exploiting common spelling mistakes or typos made by users. These fake websites are used to steal credentials, distribute malware, or trick users into fraudulent transactions.
A user intending to visit "amazon.com" accidentally types "amzon.com" and is redirected to a malicious website that mimics Amazon’s homepage, prompting them to enter their login credentials.
Virtualization is a technology that allows multiple virtual systems or environments to run on a single physical server. Each virtual system operates independently, enabling efficient use of resources, cost savings, and enhanced security by isolating applications or workloads. Virtualization is widely used in cloud computing and server management.
A company uses virtualization to run multiple virtual servers on a single physical server, hosting its email system, database, and web applications separately. If one virtual server is compromised, the others remain unaffected.
Browse through these FAQs to find answers to commonly asked questions.
Popular articles