Security Glossary
A-Z of Cybersecurity Terms
A
AES (Advanced Encryption Standard)
Symmetric encryption algorithm adopted by the U.S. government. AES-256 is considered unbreakable with current technology and is widely used for securing sensitive data.
Authentication
The process of verifying identity. Can use something you know (password), something you have (security key), or something you are (biometrics).
Attack Surface
The total number of points where an attacker could try to enter or extract data. Reducing attack surface is a key security principle.
B
Backdoor
A hidden method of bypassing normal authentication. Can be intentionally built into software or installed by malware.
Botnet
A network of compromised computers controlled by an attacker. Used for DDoS attacks, spam distribution, and cryptocurrency mining.
Brute Force Attack
Attempting every possible combination until the correct one is found. Why long, complex passwords matter.
C
CIA Triad
Confidentiality, Integrity, Availability - the three pillars of information security that guide security policies and measures.
Cryptography
The practice of securing communication through encoding. Modern cryptography enables secure internet transactions and private messaging.
CVE (Common Vulnerabilities and Exposures)
A standardized system for identifying and cataloging security vulnerabilities. Each CVE has a unique ID for reference.
D
DDoS (Distributed Denial of Service)
An attack that overwhelms a target with traffic from multiple sources, making services unavailable to legitimate users.
DNS (Domain Name System)
The internet's phone book, translating domain names to IP addresses. DNS attacks can redirect users to malicious sites.
E
Encryption
Converting data into a coded format that can only be read with the correct key. Essential for protecting data in transit and at rest.
End-to-End Encryption (E2EE)
Encryption where only communicating parties can read messages. Even the service provider cannot decrypt the content.
Exploit
Code or technique that takes advantage of a vulnerability to gain unauthorized access or cause unintended behavior.
F
Firewall
A security system that monitors and controls network traffic based on predetermined rules. Can be hardware or software-based.
Fingerprinting
Collecting unique characteristics of a device or browser to identify and track users, even without cookies.
H
Hash Function
A one-way function that converts data into a fixed-size output. Used for password storage and data integrity verification.
HTTPS
HTTP Secure - encrypted version of HTTP using TLS. Look for the padlock icon to ensure your connection is encrypted.
K
Keylogger
Malware that records keystrokes to capture passwords, credit card numbers, and other sensitive information.
M
Malware
Malicious software including viruses, worms, trojans, ransomware, and spyware designed to harm or exploit systems.
MFA (Multi-Factor Authentication)
Requiring two or more verification methods. Significantly reduces the risk of account compromise.
MITM (Man-in-the-Middle)
An attack where the attacker secretly intercepts and potentially alters communications between two parties.
P
Phishing
Social engineering attack using deceptive emails, websites, or messages to trick victims into revealing sensitive information.
PGP (Pretty Good Privacy)
Encryption program providing cryptographic privacy and authentication, commonly used for email encryption.
Patch
A software update that fixes vulnerabilities or bugs. Keeping software patched is critical for security.
R
Ransomware
Malware that encrypts victim's files and demands payment for the decryption key. Prevention and backups are essential.
RSA
Asymmetric cryptographic algorithm widely used for secure data transmission. Based on the difficulty of factoring large primes.
S
Social Engineering
Psychological manipulation to trick people into making security mistakes or giving up sensitive information.
SSL/TLS
Protocols for encrypting internet communications. TLS is the successor to SSL and secures HTTPS connections.
Spyware
Malware that secretly monitors user activity and collects personal information without consent.
T
Trojan
Malware disguised as legitimate software. Unlike viruses, trojans don't replicate themselves but create backdoors for attackers.
Two-Factor Authentication (2FA)
Security process requiring two different authentication factors. Dramatically reduces account compromise risk.
V
VPN (Virtual Private Network)
Creates an encrypted tunnel for your internet traffic, hiding your IP address and protecting data on untrusted networks.
Vulnerability
A weakness in software, hardware, or procedures that can be exploited by attackers to gain unauthorized access.
Z
Zero-Day
A vulnerability unknown to the software vendor with no available patch. Highly valuable to attackers and difficult to defend against.
Zero Trust
Security model based on "never trust, always verify." Every access request is fully authenticated regardless of source.