Cybersecurity
Antivirus
A software program designed to detect, prevent, and remove malware from computers and networks.
Authentication
The process of verifying the identity of a user or system, often through passwords, biometrics, or security tokens.
Authorization
The process of granting or denying access to resources based on user identity and permissions.
Brute Force Attack
A method of guessing passwords or encryption keys by systematically trying all possible combinations.
Data Breach
An incident in which sensitive, protected, or confidential data is accessed or disclosed without authorization.
DDoS (Distributed Denial of Service)
An attack that floods a system or network with traffic from multiple sources, rendering it unavailable to legitimate users.
Encryption
The process of converting data into a coded format to prevent unauthorized access, requiring a key to decode.
Firewall
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Honeypot
A decoy system or network designed to attract attackers and monitor their behavior without risking actual data.
Malware
Malicious software designed to damage, disrupt, or gain unauthorized access to systems, including viruses, worms, and trojans.
Multi-Factor Authentication (MFA)
A security process that requires users to provide two or more verification factors to gain access to a system.
Phishing
A cyberattack method that uses fraudulent emails or websites to trick users into revealing personal or financial information.
Ransomware
A type of malware that encrypts a victim’s files or system, demanding a ransom payment to restore access.
Social Engineering
The manipulation of people into divulging confidential information, often by pretending to be a trusted source.
Spoofing
An attack where a person or program masquerades as another by falsifying data, such as email addresses or IPs.
Spyware
Software that secretly gathers information about a user and sends it to another entity without the user’s consent.
Threat Intelligence
The collection and analysis of information about potential or current cyber threats, used to anticipate and respond to attacks.
Trojan Horse
A type of malware that disguises itself as legitimate software to trick users into installing it.
Vulnerability
A weakness in a system or application that can be exploited by attackers to gain unauthorized access or cause harm.
Zero-Day
A vulnerability that is unknown to the vendor or developer and has no patch or fix available at the time it is discovered or exploited.
Want to explore more? Stay tuned for new terms and updates!