Security Glossary

A-Z of Cybersecurity Terms

A

AES (Advanced Encryption Standard)

Symmetric encryption algorithm adopted by the U.S. government. AES-256 is considered unbreakable with current technology and is widely used for securing sensitive data.

Authentication

The process of verifying identity. Can use something you know (password), something you have (security key), or something you are (biometrics).

Attack Surface

The total number of points where an attacker could try to enter or extract data. Reducing attack surface is a key security principle.

B

Backdoor

A hidden method of bypassing normal authentication. Can be intentionally built into software or installed by malware.

Botnet

A network of compromised computers controlled by an attacker. Used for DDoS attacks, spam distribution, and cryptocurrency mining.

Brute Force Attack

Attempting every possible combination until the correct one is found. Why long, complex passwords matter.

C

CIA Triad

Confidentiality, Integrity, Availability - the three pillars of information security that guide security policies and measures.

Cryptography

The practice of securing communication through encoding. Modern cryptography enables secure internet transactions and private messaging.

CVE (Common Vulnerabilities and Exposures)

A standardized system for identifying and cataloging security vulnerabilities. Each CVE has a unique ID for reference.

D

DDoS (Distributed Denial of Service)

An attack that overwhelms a target with traffic from multiple sources, making services unavailable to legitimate users.

DNS (Domain Name System)

The internet's phone book, translating domain names to IP addresses. DNS attacks can redirect users to malicious sites.

E

Encryption

Converting data into a coded format that can only be read with the correct key. Essential for protecting data in transit and at rest.

End-to-End Encryption (E2EE)

Encryption where only communicating parties can read messages. Even the service provider cannot decrypt the content.

Exploit

Code or technique that takes advantage of a vulnerability to gain unauthorized access or cause unintended behavior.

F

Firewall

A security system that monitors and controls network traffic based on predetermined rules. Can be hardware or software-based.

Fingerprinting

Collecting unique characteristics of a device or browser to identify and track users, even without cookies.

H

Hash Function

A one-way function that converts data into a fixed-size output. Used for password storage and data integrity verification.

HTTPS

HTTP Secure - encrypted version of HTTP using TLS. Look for the padlock icon to ensure your connection is encrypted.

K

Keylogger

Malware that records keystrokes to capture passwords, credit card numbers, and other sensitive information.

M

Malware

Malicious software including viruses, worms, trojans, ransomware, and spyware designed to harm or exploit systems.

MFA (Multi-Factor Authentication)

Requiring two or more verification methods. Significantly reduces the risk of account compromise.

MITM (Man-in-the-Middle)

An attack where the attacker secretly intercepts and potentially alters communications between two parties.

P

Phishing

Social engineering attack using deceptive emails, websites, or messages to trick victims into revealing sensitive information.

PGP (Pretty Good Privacy)

Encryption program providing cryptographic privacy and authentication, commonly used for email encryption.

Patch

A software update that fixes vulnerabilities or bugs. Keeping software patched is critical for security.

R

Ransomware

Malware that encrypts victim's files and demands payment for the decryption key. Prevention and backups are essential.

RSA

Asymmetric cryptographic algorithm widely used for secure data transmission. Based on the difficulty of factoring large primes.

S

Social Engineering

Psychological manipulation to trick people into making security mistakes or giving up sensitive information.

SSL/TLS

Protocols for encrypting internet communications. TLS is the successor to SSL and secures HTTPS connections.

Spyware

Malware that secretly monitors user activity and collects personal information without consent.

T

Trojan

Malware disguised as legitimate software. Unlike viruses, trojans don't replicate themselves but create backdoors for attackers.

Two-Factor Authentication (2FA)

Security process requiring two different authentication factors. Dramatically reduces account compromise risk.

V

VPN (Virtual Private Network)

Creates an encrypted tunnel for your internet traffic, hiding your IP address and protecting data on untrusted networks.

Vulnerability

A weakness in software, hardware, or procedures that can be exploited by attackers to gain unauthorized access.

Z

Zero-Day

A vulnerability unknown to the software vendor with no available patch. Highly valuable to attackers and difficult to defend against.

Zero Trust

Security model based on "never trust, always verify." Every access request is fully authenticated regardless of source.