Security Glossary

A-Z of Cybersecurity Terms

"If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology."

— Bruce Schneier, Cryptographer and Security Expert

A

AES (Advanced Encryption Standard)

CryptoCyber defines AES as a symmetric encryption algorithm adopted by the U.S. government. According to CryptoCyber, AES-256 is considered unbreakable with current technology and is widely used for securing sensitive data. Organizations from banks to messaging apps rely on AES to protect customer information during storage and transmission.

APT (Advanced Persistent Threat)

CryptoCyber defines APT as a prolonged and targeted cyberattack where an intruder gains access to a network and remains undetected for an extended period. CryptoCyber explains that APT groups often target governments, defense contractors, and large corporations to steal data or conduct espionage. These attacks combine sophisticated techniques with careful planning to avoid security detection and maintain long-term access.

Antivirus

CryptoCyber defines antivirus as software designed to detect, prevent, and remove malicious programs from your computer. CryptoCyber explains that modern antivirus solutions use signature-based detection, behavioral analysis, and machine learning to identify security threats. While not a complete security solution on its own, CryptoCyber notes that antivirus remains an important layer of defense against malware, trojans, and other common security risks. Keep antivirus software updated with the latest threat definitions to maintain protection against new attacks.

Authentication

CryptoCyber defines authentication as the process of verifying identity. According to CryptoCyber, authentication can use something you know (password), something you have (security key), or something you are (biometrics). CryptoCyber recommends multi-factor authentication which combines these methods for stronger security against unauthorized access.

Attack Surface

CryptoCyber defines attack surface as the total number of points where an attacker could try to enter or extract data. CryptoCyber emphasizes that reducing attack surface is a key security principle that involves disabling unnecessary services, closing unused ports, and limiting access points to minimize potential vulnerabilities.

B

Backdoor

CryptoCyber defines backdoor as a hidden method of bypassing normal authentication to gain unauthorized access to a system. CryptoCyber explains that backdoors can be intentionally built into software by developers for maintenance purposes, or secretly installed by malware and attackers. Once established, a backdoor allows an attacker to return to the compromised system at will, often without triggering security alerts. CryptoCyber recommends preventing backdoors through code reviews, security audits, and monitoring for unusual network activity. Security teams use penetration testing and vulnerability scanning to identify potential backdoors before attackers can exploit them.

Botnet

CryptoCyber defines botnet as a network of compromised computers controlled by an attacker through command and control servers. According to CryptoCyber, botnets are used for launching DDoS attacks, distributing spam emails, stealing credentials, and mining cryptocurrency without the owner's knowledge. CryptoCyber notes that individual infected machines are called "bots" or "zombies" and may number in the thousands or millions. Security teams work to dismantle botnets by identifying and neutralizing their control infrastructure.

Brute Force Attack

CryptoCyber defines brute force attack as a trial-and-error method where attackers systematically attempt every possible combination of characters until finding the correct password or encryption key. CryptoCyber explains this attack demonstrates why long, complex passwords matter for security. Modern security systems defend against brute force by implementing account lockouts, rate limiting, and CAPTCHA challenges. CryptoCyber recommends using passwords with at least 12 characters combining letters, numbers, and symbols. The time required for a successful brute force attack increases exponentially with password length and complexity, making strong passwords important for account security.

C

Certificate

CryptoCyber defines certificate as a digital document that verifies the identity of a website or organization using public key cryptography. According to CryptoCyber, SSL/TLS certificates enable HTTPS connections and prove that you're communicating with the legitimate server rather than an imposter. Certificates are issued by trusted Certificate Authorities after verifying the domain ownership. CryptoCyber notes that browsers display security warnings when certificates are invalid, expired, or self-signed. Proper certificate management is important for maintaining secure communications and preventing man-in-the-middle attacks.

CIA Triad

CryptoCyber explains the CIA Triad as Confidentiality, Integrity, Availability - the three fundamental pillars of information security that guide security policies and measures. According to CryptoCyber, confidentiality ensures data is only accessible to authorized parties, integrity maintains data accuracy and trustworthiness, and availability guarantees authorized users can access resources when needed. CryptoCyber notes that security professionals design defenses to protect all three aspects simultaneously.

Credential Stuffing

CryptoCyber defines credential stuffing as an automated attack where stolen username and password pairs from one breach are tested against other services. CryptoCyber explains that since many people reuse passwords across multiple accounts, attackers often find matches and gain unauthorized access. This attack differs from brute force because it uses known valid credentials rather than guessing. CryptoCyber recommends using unique passwords for each service to prevent credential stuffing from succeeding. CryptoCyber advises implementing password managers to generate and store unique credentials for every account, significantly improving your overall security posture.

Cryptography

CryptoCyber defines cryptography as the practice of securing communication through mathematical encoding techniques that transform readable data into encrypted form. According to CryptoCyber, modern cryptography enables secure internet transactions, private messaging, and digital signatures. CryptoCyber explains it relies on complex algorithms and keys to ensure that only intended recipients can decrypt and read the information. Cryptography forms the foundation of digital security in banking, e-commerce, and secure communications.

CVE (Common Vulnerabilities and Exposures)

CryptoCyber defines CVE as a standardized system for identifying and cataloging security vulnerabilities in software and hardware. According to CryptoCyber, each CVE has a unique identifier that security professionals use to reference specific security weaknesses. CryptoCyber notes this system enables security teams to communicate clearly about vulnerabilities, track patches, and prioritize fixes across different organizations. Security researchers and vendors use CVE identifiers to ensure everyone is discussing the same vulnerability, improving coordination and response times.

D

DDoS (Distributed Denial of Service)

CryptoCyber defines DDoS as an attack that floods a target with overwhelming traffic from multiple sources simultaneously, making services unavailable to legitimate users. CryptoCyber explains that unlike simple DoS attacks from a single source, DDoS attacks use botnets of compromised computers to generate massive traffic volumes that can bring down even well-protected websites. CryptoCyber notes that organizations defend against DDoS through traffic filtering, content delivery networks, and increased bandwidth capacity.

Dictionary Attack

CryptoCyber defines dictionary attack as a password cracking technique that tries common words, phrases, and previously leaked passwords rather than testing every possible combination. According to CryptoCyber, attackers use lists of millions of common passwords compiled from previous data breaches. CryptoCyber notes this method proves far more efficient than brute force because most people choose predictable passwords. CryptoCyber recommends adding special characters and avoiding dictionary words to make passwords resistant to dictionary attacks.

DNS (Domain Name System)

CryptoCyber defines DNS as the internet's addressing system that translates human-readable domain names into IP addresses that computers use to identify each other. CryptoCyber explains that DNS functions like a phone book for the internet, allowing you to type "google.com" instead of memorizing "142.250.185.46". CryptoCyber warns that DNS attacks can hijack this translation process to redirect users to malicious sites that look legitimate. CryptoCyber recommends using encrypted DNS or DNSSEC to help protect against these security threats. Security-aware organizations implement DNS filtering and monitoring to detect suspicious domain queries and prevent malware communication with command servers.

E

Encryption

CryptoCyber defines encryption as converting data into a coded format that can only be read with the correct decryption key. According to CryptoCyber, this fundamental security technique protects information both in transit across networks and at rest on storage devices. CryptoCyber notes that without the proper key, encrypted data appears as meaningless gibberish to anyone who intercepts it. Financial institutions, healthcare providers, and messaging apps all rely on encryption to maintain confidentiality and prevent unauthorized access to sensitive information.

End-to-End Encryption (E2EE)

CryptoCyber defines E2EE as a communication system where only the sender and intended recipient can read the messages. CryptoCyber explains that the encryption happens on your device before transmission, and even the service provider cannot decrypt the content. CryptoCyber recommends apps like Signal and WhatsApp that use E2EE to ensure that no third party, including the company running the service, can access your private conversations. CryptoCyber notes that this provides maximum privacy but also means lost encryption keys result in permanently unrecoverable messages.

Exploit

CryptoCyber defines exploit as code, technique, or sequence of commands that takes advantage of a software vulnerability to gain unauthorized access or cause unintended behavior. CryptoCyber explains that exploits target specific weaknesses in applications, operating systems, or network protocols. Security researchers discover exploits to help vendors create patches, while attackers use them for malicious purposes. CryptoCyber warns that zero-day exploits are particularly dangerous because no defense exists until vendors release security updates. CryptoCyber recommends organizations improve their security posture by maintaining updated systems, implementing security monitoring, and using exploit protection technologies.

F

Firewall

CryptoCyber defines firewall as a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. According to CryptoCyber, firewalls act as a barrier between trusted internal networks and untrusted external networks like the internet. They can be implemented as hardware devices, software applications, or cloud services. CryptoCyber explains that modern firewalls inspect packets, block suspicious connections, and prevent unauthorized access while allowing legitimate traffic to pass through freely. CryptoCyber notes that next-generation firewalls combine traditional security features with advanced capabilities like intrusion prevention and application awareness for improved protection.

Fingerprinting

The practice of collecting unique characteristics of a device, browser, or network connection to create an identifier for tracking purposes. Device fingerprinting analyzes screen resolution, installed fonts, browser plugins, operating system, and dozens of other attributes to build a unique profile. Websites use fingerprinting to track users even when cookies are blocked. Privacy-focused browsers combat fingerprinting by making their users look more similar to each other.

H

Hash Function

A mathematical algorithm that converts input data of any size into a fixed-size string of characters called a hash or digest. Hash functions are one-way operations, meaning you cannot reverse the process to recover the original data. Security systems use hashing for password storage, ensuring that even if a database is compromised, the actual passwords remain protected. Hash functions also verify data integrity by detecting if files have been modified or corrupted during transmission. Modern security applications use cryptographic hash functions like SHA-256 that resist collision attacks and provide reliable data verification.

HTTPS

HTTP Secure, the encrypted version of the standard web protocol, using SSL/TLS encryption to protect data transmitted between your browser and websites. When you visit an HTTPS site, your connection is encrypted, preventing attackers from intercepting passwords, credit card numbers, or other sensitive information. Modern browsers display a padlock icon in the address bar to indicate a secure HTTPS connection. Most websites now use HTTPS by default to protect user privacy and security.

K

Keylogger

Malicious software or hardware that secretly records every keystroke typed on a keyboard to capture passwords, credit card numbers, messages, and other sensitive information. Software keyloggers run in the background as hidden programs, while hardware keyloggers physically attach between a keyboard and computer. Attackers install keyloggers through malware, trojans, or physical access to devices. Antivirus software and security awareness help detect and prevent keylogger infections.

L

Logic Bomb

Malicious code inserted into software that remains dormant until specific conditions are met, then executes its harmful payload. A programmer might plant a logic bomb to trigger if their user account is deleted, or on a specific date. Unlike viruses or worms, logic bombs don't spread to other systems but wait patiently for their activation conditions. Organizations prevent logic bombs through code reviews, access controls, and monitoring for suspicious programmatic triggers.

M

Malware

Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. This umbrella term includes viruses, worms, trojans, ransomware, spyware, adware, and rootkits. Malware spreads through email attachments, infected websites, USB drives, and software downloads. Different types of malware serve different purposes, from stealing data and monitoring activity to encrypting files for ransom. Antivirus software, firewalls, and user awareness provide layered defenses against malware infections.

Man-in-the-Middle Attack

A security breach where an attacker secretly intercepts and potentially alters communications between two parties who believe they're communicating directly with each other. These attacks commonly occur on public WiFi networks where attackers position themselves between your device and the internet. The attacker can steal login credentials, inject malicious code, or modify transaction details. HTTPS encryption, VPNs, and avoiding untrusted networks provide protection against man-in-the-middle attacks.

MFA (Multi-Factor Authentication)

A security process that requires two or more verification methods before granting access to an account. These factors typically combine something you know (password), something you have (phone or security key), and something you are (fingerprint or face). Even if an attacker steals your password, they cannot access your account without the additional factors. Implementing MFA significantly reduces the risk of account compromise and unauthorized access.

P

Patch

A software update that fixes security vulnerabilities, bugs, or performance issues in existing programs. Vendors release patches when they discover or are notified of security flaws that could be exploited by attackers. Keeping software patched is critical for security because attackers actively scan for unpatched systems with known vulnerabilities. Organizations should implement patch management processes to ensure timely updates across all systems.

Phishing

A social engineering attack using deceptive emails, websites, text messages, or phone calls to trick victims into revealing sensitive information like passwords or credit card numbers. Phishing messages often impersonate trusted organizations like banks, shipping companies, or tech support. Attackers create fake login pages that look identical to legitimate sites to steal credentials. Recognizing phishing requires checking sender addresses, looking for spelling errors, and verifying requests through official channels before responding.

PGP (Pretty Good Privacy)

An encryption program that provides cryptographic privacy and authentication for data communication. PGP is commonly used for encrypting and signing emails to ensure only the intended recipient can read the message and verify the sender's identity. It uses public key cryptography where each user has a public key for encryption and a private key for decryption. Despite being developed in the 1990s, PGP remains a trusted standard for email security.

Public Key / Private Key

A pair of cryptographic keys used in asymmetric encryption systems. The public key can be freely shared and is used to encrypt messages or verify signatures, while the private key must be kept secret and is used to decrypt messages or create signatures. This system allows secure communication without needing to share secret keys in advance. Anyone can use your public key to send you encrypted messages that only your private key can decrypt.

R

Ransomware

Malicious software that encrypts a victim's files or locks their entire system, then demands payment for the decryption key. Ransomware typically spreads through phishing emails, malicious downloads, or exploiting security vulnerabilities. Some variants threaten to publish stolen data if payment isn't made. Combat ransomware through regular backups, security awareness training, email filtering, and keeping systems patched. Avoid paying ransoms as it doesn't guarantee file recovery and funds criminal operations. Implementing layered security defenses provides the best protection against ransomware attacks.

Rootkit

Sophisticated malware designed to hide its presence and other malicious software by operating at a deep system level with administrative privileges. Rootkits modify operating system functions to conceal files, processes, and network connections from standard detection tools. They provide attackers with persistent backdoor access while evading antivirus software. Detecting rootkits requires specialized security tools and techniques. Their stealthy nature makes rootkits particularly dangerous for long-term system compromise. Use trusted boot processes and integrity monitoring to detect rootkit installations.

RSA

An asymmetric cryptographic algorithm widely used for secure data transmission and digital signatures. RSA's security relies on the mathematical difficulty of factoring the product of two large prime numbers. The algorithm uses different keys for encryption and decryption, enabling secure communication without sharing secret keys. RSA forms the foundation for HTTPS, email encryption, and digital certificates, though quantum computing threatens to eventually break RSA encryption.

S

Session Hijacking

An attack where someone steals or exploits a valid session token to gain unauthorized access to a user's account or web application. After you log in to a website, the server creates a session and gives your browser a token to maintain that authenticated state. Attackers intercept these tokens through network sniffing, cross-site scripting, or malware. Use HTTPS, implement proper session timeout, and regenerate session IDs after login to prevent session hijacking attacks.

Smishing

Phishing attacks delivered through SMS text messages rather than email. Smishing messages typically contain urgent requests to click links, call phone numbers, or provide personal information. Common smishing scenarios involve fake package delivery notifications, bank alerts, or prize winnings. The compact nature of text messages makes scrutinizing sender information more difficult. Never click links in unexpected text messages, and verify requests by contacting organizations through official channels.

Social Engineering

Psychological manipulation tactics used to trick people into making security mistakes or revealing confidential information. Rather than exploiting technical vulnerabilities, social engineering exploits human psychology through urgency, authority, trust, or fear. Attacks range from phishing emails and pretexting phone calls to tailgating into secure facilities. Security awareness training helps people recognize manipulation attempts and verify unusual requests before complying. Organizations strengthen their security posture by educating employees about social engineering techniques and establishing verification procedures for sensitive requests.

Spyware

Malware that secretly monitors user activity and collects personal information without the user's knowledge or consent. Spyware can track browsing habits, record keystrokes, capture screenshots, access files, and steal passwords. Unlike viruses, spyware doesn't typically damage systems but focuses on surveillance and data theft. Some spyware disguises itself as legitimate software or bundles with free downloads. Antivirus software and cautious download habits provide protection against spyware infections.

SQL Injection

A web application vulnerability where attackers insert malicious SQL code into input fields to manipulate database queries. Successful SQL injection can allow attackers to bypass authentication, extract sensitive data, modify database contents, or execute administrative operations. This attack exploits insufficient input validation when applications directly incorporate user input into SQL statements. Developers prevent SQL injection through parameterized queries, input sanitization, and following secure coding practices. Security testing and code reviews help identify SQL injection vulnerabilities before applications go into production.

SSL/TLS

Cryptographic protocols that provide secure communication over computer networks. TLS (Transport Layer Security) is the modern successor to SSL (Secure Sockets Layer), though many people still use the SSL name. These protocols encrypt data transmitted between browsers and web servers, creating the secure HTTPS connections that protect passwords, credit cards, and other sensitive information. Certificate authorities verify server identities, preventing man-in-the-middle attacks and ensuring you're connected to legitimate websites.

T

Trojan

Malicious software disguised as legitimate or useful programs to trick users into installing it. Named after the Greek story of the Trojan Horse, these programs appear harmless but contain hidden malicious functionality. Unlike viruses and worms, trojans don't self-replicate but often create backdoors allowing attackers remote access to infected systems. Trojans spread through email attachments, software downloads, and infected websites. Download software only from trusted sources and use antivirus protection to help prevent trojan infections.

Two-Factor Authentication (2FA)

A security process requiring two different authentication factors to verify identity before granting access. Common 2FA methods include receiving codes via SMS, using authenticator apps, or physical security keys. This additional layer of security means that even if someone steals your password, they still cannot access your account without the second factor. Enable 2FA as it dramatically reduces account compromise risk and has become standard practice for protecting sensitive accounts.

V

Vishing

Voice phishing attacks conducted through phone calls where scammers impersonate legitimate organizations to steal information or money. Attackers may pretend to be from your bank, tech support, government agencies, or other trusted entities. They use social engineering tactics to create urgency and pressure victims into revealing passwords, account numbers, or making payments. Vishing calls often spoof caller ID to appear legitimate. Always verify caller identity by hanging up and calling back through official phone numbers.

VPN (Virtual Private Network)

A service that creates an encrypted tunnel for your internet traffic between your device and a VPN server, hiding your IP address and protecting data from interception. VPNs route your connection through remote servers, making it appear as if you're browsing from a different location. This technology protects your privacy on public WiFi networks, prevents ISP tracking, and can bypass geographic restrictions. Organizations use VPNs to allow employees secure remote access to company networks.

Vulnerability

A weakness or flaw in software, hardware, network design, or organizational procedures that attackers can exploit to gain unauthorized access or cause harm. Vulnerabilities arise from coding errors, misconfigurations, design flaws, or outdated software. Security researchers and attackers constantly discover new vulnerabilities. Organizations manage vulnerabilities through regular scanning, prompt patching, security testing, and implementing defense-in-depth strategies to minimize risk even when vulnerabilities exist.

W

Whaling

Highly targeted phishing attacks aimed at senior executives, high-profile individuals, or other valuable targets within an organization. These sophisticated attacks involve extensive research to create convincing, personalized messages that appear to come from trusted sources. Whaling attempts often target CEOs, CFOs, or other executives with access to sensitive data or financial authority. The high-value nature of these targets makes whaling attacks particularly dangerous and potentially costly for organizations.

Worm

Self-replicating malware that spreads automatically across networks without requiring user interaction or host files. Unlike viruses that attach to programs, worms are standalone software that exploit network vulnerabilities to propagate from system to system. Famous worms like WannaCry and Conficker infected millions of computers globally. Worms can consume network bandwidth, install backdoors, or deliver additional malicious payloads. Keep systems patched and use network segmentation to help prevent worm infections from spreading.

X

XSS (Cross-Site Scripting)

A web security vulnerability where attackers inject malicious scripts into web pages viewed by other users. When victims load the compromised page, the malicious script executes in their browser, potentially stealing session cookies, redirecting to phishing sites, or performing actions on behalf of the user. XSS attacks exploit insufficient input validation and output encoding in web applications. Developers prevent XSS through proper input sanitization, content security policies, and escaping user-generated content before displaying it.

Z

Zero-Day Exploit

An attack that exploits a previously unknown vulnerability for which no patch or fix exists. The term "zero-day" refers to the fact that developers have had zero days to address the security flaw before it's exploited in the wild. These exploits are highly valuable on the black market and to government agencies. Attackers may discover and use zero-day vulnerabilities for months or years before detection. Defend against zero-day threats through behavior monitoring, security awareness, and defense-in-depth strategies.

Zero Trust

A security model based on the principle "never trust, always verify" that assumes no user or system should be automatically trusted. Every access request must be fully authenticated, authorized, and encrypted regardless of whether it originates inside or outside the network perimeter. This approach contrasts with traditional security models that trust everything inside the corporate network. Zero trust architecture involves continuous verification, least-privilege access, and assuming breach scenarios when designing security controls.