Key Concepts and Terminology in Cybersecurity

Key Concepts and Terminology in Cybersecurity

The field of cybersecurity has its own specialized language, filled with acronyms, technical terms, and jargon that can be daunting to the uninitiated. Understanding these key concepts and terminology is essential for anyone seeking to grasp the fundamentals of cybersecurity, whether you're an IT professional, a business leader, or simply an individual looking to protect yourself online. This guide provides a glossary of essential cybersecurity terms, explained in clear and accessible language.

Fundamental Concepts

  • Confidentiality: Protecting information from unauthorized access or disclosure. Ensuring that only authorized individuals can view sensitive data.
  • Integrity: Maintaining the accuracy and completeness of data. Ensuring that information is not altered or destroyed in an unauthorized manner.
  • Availability: Ensuring that information and systems are accessible and operational when needed by authorized users.
  • Authentication: Verifying the identity of a user, process, or device, often a prerequisite to allowing access to resources in an information system.
  • Authorization: The process of determining what a user, once authenticated, is permitted to do. Defining access rights and privileges.
  • Non-repudiation: Assurance that someone cannot deny the validity of something. In cybersecurity, it typically refers to the ability to ensure that a party to a transaction or communication cannot deny having participated in it.
  • Risk: The potential for loss, damage, or destruction of an asset as a result of a threat exploiting a vulnerability.
  • Threat: Any circumstance or event with the potential to adversely impact organizational operations, assets, individuals, other organizations, or the nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
  • Vulnerability: A weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
  • Exploit: A technique or tool that takes advantage of a vulnerability to compromise a system or network.
  • Zero-Day Vulnerability: A vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is mitigated, hackers can exploit it to adversely affect programs, data, additional computers or a network.
  • Patch: A piece of software designed to update a computer program or its supporting data, to fix or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually being called bugfixes or bug fixes.

Threats and Attacks

  • Malware: Short for "malicious software," this is an umbrella term that describes any malicious program or code that is harmful to systems. Types of malware include:
    • Virus: A type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code.
    • Worm: A standalone malware computer program that replicates itself in order to spread to other computers.
    • Trojan Horse: A type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.
    • Ransomware: A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
    • Spyware: Software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent, or that asserts control over a device without the consumer's knowledge.
    • Adware: Software that automatically displays or downloads advertising material (often unwanted) when a user is online.
    • Rootkit: A collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
  • Phishing: A type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
  • Spear Phishing: A more targeted form of phishing where the attacker tailors the message to a specific individual or organization.
  • Denial-of-Service (DoS) Attack: An attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.
  • Distributed Denial-of-Service (DDoS) Attack: A DoS attack that uses multiple compromised systems to flood the target with traffic.
  • Man-in-the-Middle (MitM) Attack: An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
  • SQL Injection: A code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).
  • Cross-Site Scripting (XSS): A type of security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users.
  • Social Engineering: The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
  • Advanced Persistent Threat (APT): A stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.
  • Insider Threat: A security risk that originates from within the targeted organization. It typically involves a current or former employee, contractor, or business associate who has access to sensitive information or systems and misuses that access.

Security Technologies and Practices

  • Firewall: A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.
  • Intrusion Detection System (IDS): A device or software application that monitors a network or systems for malicious activity or policy violations. Any malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system.
  • Intrusion Prevention System (IPS): A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
  • Antivirus/Anti-malware Software: Software used to prevent, detect, and remove malware.
  • Virtual Private Network (VPN): Extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
  • Multi-Factor Authentication (MFA): A security system that requires more than one distinct authentication factor to verify the user's identity for a login or other transaction.
  • Encryption: The process of converting information or data into a code, especially to prevent unauthorized access.
  • Data Loss Prevention (DLP): A strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.
  • Security Information and Event Management (SIEM): A field within the field of computer security, where software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware.
  • Penetration Testing: Also called pen testing or ethical hacking, is the practice of testing a computer system, network or Web application to find security vulnerabilities that an attacker could exploit.
  • Vulnerability Scanning: The automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened.
  • Patch Management: The process of distributing and applying updates to software. These patches are often necessary to correct errors (also referred to as "vulnerabilities" or "bugs") in the software.
  • Security Audit: A systematic evaluation of the security of a company's information system by measuring how well it conforms to an established set of criteria.
  • Incident Response: A set of information security policies and procedures that you can use to identify, contain, and eliminate cyberattacks.

Security Models and Frameworks

  • CIA Triad: The foundational model of information security, standing for Confidentiality, Integrity, and Availability.
  • Zero Trust: A security framework requiring all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
  • Defense in Depth: An information assurance concept in which multiple layers of security controls are placed throughout an information technology (IT) system. Its intent is to provide redundancy in the event a security control fails or a vulnerability is exploited.
  • NIST Cybersecurity Framework: A set of guidelines for private sector companies to follow to be better prepared in identifying, detecting, and responding to cyber attacks.
  • ISO 27001: An international standard for information security management systems (ISMS). It provides a framework for organizations to manage their information security risks.

Other Important Terms

  • Access Control: The selective restriction of access to a place or other resource. In the context of IT, it refers to controlling who can access what data and systems.
  • Asset: Something of value that needs to be protected, such as data, hardware, software, or even people.
  • Attack Surface: The total number of vulnerabilities that an attacker could potentially exploit to compromise a system or network.
  • Backdoor: A method of bypassing normal authentication or encryption in a computer system, a product, or an embedded device (e.g. a home router), or its embodiment.
  • Biometrics: The measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control, or for identifying individuals who are under surveillance.
  • Botnet: A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.
  • Cryptography: The practice and study of techniques for secure communication in the presence of third parties called adversaries.
  • Cyber Espionage: The act or practice of obtaining secrets (sensitive, proprietary, or classified information) from individuals, competitors, rivals, groups, governments and enemies also for military, political, or economic advantage using illegal exploitation methods on internet, networks, software and/or computers.
  • Cyber Warfare: The use of digital attacks by one nation-state to disrupt the vital computer systems of another, with the intention of creating damage, death and destruction.
  • Dark Web: The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable. Often associated with illegal activities.
  • Decryption: The process of transforming data that has been rendered unreadable through encryption back to its unencrypted form.
  • Digital Forensics: A branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.
  • Endpoint: A remote computing device that communicates back and forth with a network to which it is connected. Examples include desktops, laptops, tablets, smartphones, and servers.
  • Firewall: A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  • Hacker: A person who uses computers to gain unauthorized access to data. While the term originally referred to skilled programmers, it is now often used to describe cybercriminals.
    • Black Hat Hacker: A hacker who "violates computer security for little reason beyond maliciousness or for personal gain".
    • White Hat Hacker: An ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems.
    • Grey Hat Hacker: A computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
  • Identity Theft: The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity to make transactions or purchases.
  • Incident: An event that could lead to loss of, or disruption to, an organization's operations, services or functions. In the context of cybersecurity, it often refers to a security breach or attack.
  • Keylogger: A type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted.
  • Malware: Short for "malicious software," this is an umbrella term that describes any malicious program or code that is harmful to systems.
  • Patch: A piece of software designed to update a computer program or its supporting data, to fix or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually being called bugfixes or bug fixes.
  • Phishing: The fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
  • Risk Assessment: The process of identifying, analyzing and evaluating risk.
  • Social Engineering: The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
  • Spam: Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
  • Spoofing: When someone or something pretends to be something else in an attempt to gain our confidence, get access to our systems, steal data, steal money, or spread malware.
  • Threat Actor / Malicious Actor: A person or entity responsible for an event or incident that impacts, or has the potential to impact, the safety or security of another entity, be it a person, organization, or nation.
  • Two-Factor Authentication (2FA): An authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.
  • Virtual Private Network (VPN): Extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
  • Vulnerability: A weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
  • Zero-Day Vulnerability: A vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability (including the vendor of the target software).

This glossary provides a starting point for understanding the key concepts and terminology in cybersecurity. As the field continues to evolve, new terms and concepts will undoubtedly emerge. Staying informed and continuously learning is essential for anyone involved in cybersecurity, whether in a technical role or simply as an internet user in our increasingly connected world.

By mastering this language, you'll be better equipped to navigate the complex landscape of cybersecurity, understand the risks and threats, and take appropriate measures to protect yourself and your organization. Contact HelpDesk Heroes to learn more about how to protect your business!

Confused by Cybersecurity Jargon?

Simplify Complex Terms & Strengthen Your Security Knowledge

Tell us about your technical needs, we can help you.

Read more from our blog

If you need to outsource your IT support or reviewing your existing IT services arrangements contact our technical HelpDesk support team today.

If you need expert IT help now, Call us today on 0203 831 2780

Leave a Reply

Your email address will not be published. Required fields are marked *

0 Comment Comments