CyberSecurity, Explained
Cybersecurity should be easy to understand and accessible to everyone. That's why we created this dictionary highlighting the terms you need to know, in plain English.
Must Know:
Access Control
Advanced Persistent Threat (APT)
Adversary
Adware
Alert
Anonymizing proxy
Antispyware
Antivirus
App (application)
Attack
Attacker
Authentication
Autorun worm
Backdoor
Backdoor Trojan
Black Hat Hacker
Blacklist
Block Page
Bluetooth
Boot Sector Malware
Botnet
Breach
Browser
Browser Hijacker | Hijacker Removal in a Flash
Browser Protection
Browsing Activity
Brute Force Attack
Bug
CVE (Common Vulnerabilities and Exposures)
Clickbait / Clickjacking
Cloud
Command and Control Center
Compromised
Cookie
Cracking
Credential Theft
Cyberattack
Cyberespionage
Cybersecurity
DDoS
DNs Hijacking
Dark Web
Data Breach
Data Leakage
Data Loss
Data Theft
Database
Deep Web
Denial-of-service attack
Document Malware
Domain
Download
Drive-by downloads
Easter Egg
Eavesdropping Attacks
Email Malware Distribution
Encryption
Exploit
Extension
FTP (File Transfer Protocol)
Fake Antivirus Malware
Fingerprint
Firewall
Flooding
GDPR General Data Protection Regulation
Gateway Security
Grey Hat Hacker
Guardio
HTTPS
Hacker
Hacking
Hacktivism
Hashing
Hijacking
Hoax
Honeypot
IP Address
IPsec
ISP (Internet Service Provider)
Identity Cloning
Identity Theft
Incident Handling
Internet Worm
Intrusion Prevention System
JBOH attack
Javascript Hijacking
Joe Job
Jolt
Juice Jacking
Kaptoxa
Keylogging
Klez
Knowledge-Based Authentication
Kraken
Lawful Interception
Link Jacking
Live Capture
Logic Bomb
Malicious Code
Malware
Man-In-The-Middle Attack
Masquerade Attack
Mobile Phone Malware
National Computer Security Center (NCSC)
National Security Agency (NSA)
Network
Network Sniffing
Network Vulnerability Scanning
Nimda
One-Time Password (OTP)
Open Source Code
Open Source Hardening Project
Operating System
Packet
Parasitic Viruses
Patch
Payment Card Skimmer
Pharming
Phishing
Pop up blocker
Potentially Unwanted Application (PUA)
Push Notifications (web
Quarantining
Ransomware
Restore
Reverse Engineering
Rootkit
SQL Injection?
SSL Certificate
Scareware
Search Hijacking
Social Engineering
Social Networking
Software
Spam: What is it and How is it Harmful?
Spear Phishing
Spoofing
Spyware
Tech Support Scam
Threat
Trojan
Two Factor Authentication
URL (Uniform resource locator)
URL or Web Content Filtering
Unauthorized access
VPN (Virtual Private Network)
Virus
Vishing
VoIP
Vulnerability
Whaling
White Hat Hacking
Whitelist
WiFi
Wiretapping
Worm
XSS
Xafecopy
Yahoo Search Virus
YubiKey
Zero-day attack
Zero-day vulnerability
Zeus Game Over
Zip Bomb
Zombie Computer