Cyber Security Glossary

Cyber Security Glossary

The internet is a dangerous place when it comes to different hackers taking advantage of advanced threats and tools. New types of ransomware, malware viruses are being born every day to take your financial information and gain monetary benefits. Your business isn’t using effective measures and comprehensive security solutions that can damage the IT infrastructure of your business.

To make cybersecurity easier for you, we have compiled the list of threats that your business should be aware of

  1. Advanced persistent threat (APT): An APT is a type of network breach that is designed to remain in the system for a certain period. APT’s are used to steal information from any organization or individual over the period rather than any immediate effect on the operations.
  2. Adware: Adware shows ads on the software mostly on web browsers to generate revenue for the creator. Adware comes packaged with online free software. However, it’s not an immediate threat but it can become a potential security threat.
  3. Botnet: A botnet is a term used for network devices built from “bots,” and these are controlled by hackers remotely.
  4. Brute- force Attacks: It is a tactic used to hack online accounts by taking advantage of encryption.
  5. Command and Control Server: It is a server that gives central commands to malware and other botnets to perform hacking.
  6. Dictionary Attack: It is an attack that uses several tactics to crack the username and password of different accounts.
  7. Exploit: it is a tool used to exploit different vulnerabilities in an IT system to steal data or install malicious software.
  8. Keylogging: It is a software or hardware used to record and capture keystrokes.
  9. Malware: Malware is derived from malicious software. It is used to describe any cyber-attack or threat that is malicious or intrusive.
  10. Phishing: Phishing is email-based hacking used to hack financial information, user name, passwords, social security number, credit card numbers to use it for personal benefit.
  11. Ransomware: Ransomware is a type of malicious activity that encrypts folders and files by preventing access to important files. In return, Ransomware tends to extort money from victims usually in form of cryptocurrencies.
  12. Spam: Spam is time-wasting emails that users receive daily and these emails go into the junk folder