{"id":5013,"date":"2020-07-29T12:04:31","date_gmt":"2020-07-29T12:04:31","guid":{"rendered":"https:\/\/securityx.ca\/blog\/?p=5013"},"modified":"2020-07-29T12:14:40","modified_gmt":"2020-07-29T12:14:40","slug":"cyber-words","status":"publish","type":"post","link":"https:\/\/securityx.ca\/blog\/cyber-words\/","title":{"rendered":"25 COMMON CYBER SECURITY WORDS THAT YOU NEED TO KNOW"},"content":{"rendered":"<h1><strong>25 COMMON CYBER WORDS THAT YOU NEED TO KNOW<\/strong><\/h1>\n<p>The topic of cyber security is sweeping the world by storm with some of the largest and most advanced companies in the world falling victim to cyber-attacks in just the last 5 years. When it comes to being a cybersecurity professional, you not only have to have the knowledge to do the job but also the appropriate <strong>cyber words<\/strong> vocabulary. This is hardly a surprise since whenever a new field of expertise arrives on the scene, it inevitably spawns new words, acronyms, and phrases.<\/p>\n<p>Well, as long as computers exist, we are at risk of having our digital data compromised and manipulated. However, living in the digital age is not all that scary especially if you know what you\u2019re doing. It\u2019s only daunting because we don\u2019t have the right solution fight against cybercrimes.<\/p>\n<p>Though if you know the right <strong>cyber words<\/strong>, you can completely ace the situation and get rid of cyber threats or reduce the risk within the real time. Wonder why you need to learn these cyber words? Well, it\u2019s great if you are cyber security expert. But if not then these cyber security words can help you understand and identify the affected areas.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>WHAT ARE THE COMMON CYBER WORDS?<\/strong><\/h2>\n<p>Regardless of your role in an organization, this glossary of cybersecurity terms was compiled for everyone from the security professional to the general end-user. Here, <a href=\"https:\/\/www.dnd.gov.ph\/miss\/PDF\/downloadables\/Cybersecurity%20Glossary%20(Edited).pdf\">you\u2019ll find definitions of terms commonly used in the security industry<\/a>. Uncover knowledge areas in which you excel and where you want to expand.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<ol>\n<li><strong> <\/strong><br \/>\n<h3><strong>IP ADDRESS<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>An internet version of a home address for your computer, which is identified when it communicates over a network; for example, connecting to the internet (a network of networks).<\/p>\n<p><a href=\"https:\/\/securityx.ca\/blog\/confidentiality-integrity-availability\/\" title=\"EVERYTHING YOU NEED TO KNOW ABOUT THE CIA TRIAD\" rel=\"bookmark\">EVERYTHING YOU NEED TO KNOW ABOUT THE CIA TRIAD<\/a><\/p>\n<ol start=\"2\">\n<li><strong> <\/strong><br \/>\n<h3><strong>EXPLOIT<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>A malicious application or script that can be used to take advantage of a computer\u2019s vulnerability.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li><strong> <\/strong><br \/>\n<h3><strong>BREACH<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"4\">\n<li><strong> <\/strong><br \/>\n<h3><strong>FIREWALL<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"5\">\n<li><strong> <\/strong><br \/>\n<h3><strong>MALWARE <\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, Trojans, worms and ransomware.<\/p>\n<p><a href=\"https:\/\/securityx.ca\/blog\/do-fingerprints-change\/\" title=\"HOW FREQUENT DO FINGERPRINTS CHANGE?\" rel=\"bookmark\">HOW FREQUENT DO FINGERPRINTS CHANGE?<\/a><\/p>\n<ol start=\"6\">\n<li><strong> <\/strong><br \/>\n<h3><strong>VIRUS<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"7\">\n<li><strong> <\/strong><br \/>\n<h3><strong>RANSOMWARE<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>A form of malware that deliberately prevents you from accessing files on your computer \u2013 holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"8\">\n<li><strong> <\/strong><br \/>\n<h3><strong>TROJAN HORSE<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>A piece of malware that often allows a hacker to gain remote access to a computer through a \u201cback door\u201d.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"9\">\n<li><strong> <\/strong><br \/>\n<h3><strong>COMPUTER WORM<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>A piece of malware that can replicate itself in order to spread the infection to other connected computers.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"10\">\n<li><strong> <\/strong><br \/>\n<h3><strong>BOT\/BOTNET<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer. A collection of these infected computers is known as a \u201cbotnet\u201d and is controlled by the hacker or \u201cbot-herder\u201d.<\/p>\n<p><a href=\"https:\/\/securityx.ca\/blog\/retina-scan-security\/\" title=\"HOW MUCH SECURITY DOES A RETINAL SCAN OFFER?\" rel=\"bookmark\">HOW MUCH SECURITY DOES A RETINAL SCAN OFFER?<\/a><\/p>\n<ol start=\"11\">\n<li><strong> <\/strong><br \/>\n<h3><strong>DDOS<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>An acronym that stands for distributed denial of service \u2013 a form of cyber-attack. This attack aims to make a service such as a website unusable by \u201cflooding\u201d it with malicious traffic or data from multiple sources (often botnets).<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"12\">\n<li><strong> <\/strong><br \/>\n<h3><strong>PHISHING OR SPEAR PHISHING<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"13\">\n<li><strong> <\/strong><br \/>\n<h3><strong>ENCRYPTION<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"14\">\n<li><strong> <\/strong><br \/>\n<h3><strong>BYOD (BRING YOUR OWN DEVICE)<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>Refers to a company security policy that allows for employees\u2019 personal devices to be used in business. A BYOD policy sets limitations and restrictions on whether or not a personal phone or laptop can be connected over the corporate network.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"15\">\n<li><strong> <\/strong><br \/>\n<h3><strong>PEN-TESTING<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>Short for \u201cpenetration testing,\u201d this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.<\/p>\n<p><a href=\"https:\/\/securityx.ca\/blog\/infomation-security-audit-checklist\/\" title=\"THE BEST INFORMATION SECURITY AUDIT CHECKLIST TO HELP YOU THRIVE\" rel=\"bookmark\">THE BEST INFORMATION SECURITY AUDIT CHECKLIST TO HELP YOU THRIVE<\/a><\/p>\n<ol start=\"16\">\n<li><strong> <\/strong><br \/>\n<h3><strong>ANTIVIRUS <\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>It is a software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"17\">\n<li><strong> <\/strong><br \/>\n<h3><strong>AUTHENTICATON<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>Authentication is a method of how a user can prove his\/her identity to a system. It can be a password, a fingerprint, a face scan.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"18\">\n<li><strong> <\/strong><br \/>\n<h3><strong>BLACKLIST <\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>Blacklist is a list of emails or other service providers that spread spam messages. Blacklists help users and companies to prevent the flood of unwanted messages.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"19\">\n<li><strong> <\/strong><br \/>\n<h3><strong>BACKUP <\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>A copy of physical or virtual data so in case they are being deleted or lost user could easily recover it. Works as a part of a data loss prevention plan.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"20\">\n<li><strong> <\/strong><br \/>\n<h3><strong>CLOSED SOURCE <\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>It is a proprietary technology whose copyright hides its source code and forbids its distribution or modification. The examples of closed source commercial software are Skype, Java, Opera.<\/p>\n<p><a href=\"https:\/\/securityx.ca\/blog\/information-risk-management\/\" title=\"WHAT IS INFORMATION RISK MANAGEMENT? UNDERSTAND IT BETTER!\" rel=\"bookmark\">WHAT IS INFORMATION RISK MANAGEMENT? UNDERSTAND IT BETTER!<\/a><\/p>\n<ol start=\"21\">\n<li><strong> <\/strong><br \/>\n<h3><strong>CLOUD <\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>Cloud computing recourses that make it available to access your files and services through the internet from any point in the world. It is possible thanks to a network of computers that provide storage and computing capabilities by the request.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"22\">\n<li><strong> <\/strong><br \/>\n<h3><strong>DATA LOSS PREVENTION (DLP) <\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>Data Loss Prevention comes with the complex of security measures, related to detecting and preventing data loss and cyberattacks. DLP is included in the organization policy, but individuals must also use this strategy to keep all data safe during ransomware or malware attack.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"23\">\n<li><strong> <\/strong><br \/>\n<h3><strong>RANSOMCLOUD <\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>It is a special type of ransomware, designed to encrypt cloud emails and attachments.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"24\">\n<li><strong> <\/strong><br \/>\n<h3><strong>ROOTKIT <\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>Rootkit is a type of malware that is used to seep into the system and steal company information. It can be very thick to detect because the malware gains control over the operating system and disguises itself. Some companies detect data leaks after months or even years.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"25\">\n<li><strong> <\/strong><br \/>\n<h3><strong>SPYWARE <\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>It is a malware that spies on the computer to collect the information about a product, a company, a person. The goals can be different \u2013 to sell this information to those who may benefit from it, like the advertisers, competitors, data companies; to obtain the banking information and passwords, and so on.<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>IN CONCLUSION<\/strong><\/h4>\n<p>Whether you\u2019re embarking on a cybersecurity journey by understanding essential defensive methods or expanding to product-specific training, <a href=\"https:\/\/www.securityx.ca\/\">Securityx<\/a> offers the right cyber-security services to help you excel.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>25 COMMON CYBER WORDS THAT YOU NEED TO KNOW The topic of cyber security is sweeping the world by storm with some of the largest and most advanced companies in the world falling victim to cyber-attacks in just the last 5 years. When it comes to being a cybersecurity professional, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5014,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[41],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.0.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>25 COMMON CYBER SECURITY WORDS THAT YOU NEED TO KNOW<\/title>\r\n<meta name=\"description\" content=\"When it comes to being a cybersecurity professional, you not only have to have the knowledge to do the job but also the appropriate cyber words vocabulary.\" \/>\r\n<meta name=\"robots\" content=\"index, follow\" \/>\r\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/securityx.ca\/blog\/cyber-words\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"25 COMMON CYBER SECURITY WORDS THAT YOU NEED TO KNOW\" \/>\r\n<meta property=\"og:description\" content=\"When it comes to being a cybersecurity professional, you not only have to have the knowledge to do the job but also the appropriate cyber words vocabulary.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/securityx.ca\/blog\/cyber-words\/\" \/>\r\n<meta property=\"og:site_name\" content=\"SecurityX Blog\" \/>\r\n<meta property=\"article:published_time\" content=\"2020-07-29T12:04:31+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2020-07-29T12:14:40+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/cyber_words.jpg\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/posts\/5013"}],"collection":[{"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/comments?post=5013"}],"version-history":[{"count":2,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/posts\/5013\/revisions"}],"predecessor-version":[{"id":5016,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/posts\/5013\/revisions\/5016"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/media\/5014"}],"wp:attachment":[{"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/media?parent=5013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/categories?post=5013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/tags?post=5013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}