Common Cyber Security Terminology
It’s not just IT professionals anymore who need to know cybersecurity terms. Understanding cybersecurity terminology and definitions will help you stay ahead of cybercriminals, whether you are a small business owner, tech user, or someone trying to protect your privacy.
We’ll walk you through the key terms in the world of cybersecurity in everyday language, with examples that are relatable to everyone.
What is cybersecurity?
Let’s clarify before we get into the jargon: Cybersecurity refers to the practice of protecting the digital world, including computers, networks, data, and devices, from unauthorized access or theft.
You are part of the cybersecurity efforts, whether you protect your phone against spyware or your company from ransomware.
Security Terms: A-Z Your friendly glossary of must-know cyber words
We’ve organized the most common cybersecurity terms alphabetically in this article, along with examples and tips.
[A] API Security
The API (Application Programming Interface) connects software. Hackers target APIs that are not well secured to gain access to apps.
For example, a hacker may find a weakness in an app’s API for food delivery and steal customer order information.
[B] Botnet
Imagine that your computer is part of a botnet that attacks a bank website. This is a botnet in action.
[C] Clickjacking
Clickjacking tricks users into clicking a harmful button, such as a hidden one.
When you click “Play” to play a video, you are giving hackers access to your webcam.
[D] Distributed Denial of Service
Imagine a small shop being overwhelmed by thousands of customers at the same time. It will stop working.
[E] Exploit
An attack uses code or a technique to exploit a weakness in a system.
When your software is old, an attacker may use an exploit.
[F] Firewall
A firewall controls the traffic that enters and leaves your network.
This firewall blocks websites and apps that are not trustworthy from accessing your computer.
[H] Harpooning vs. Spear Phishing
Spear phishing targets anyone with convincing fake emails. For example, imagine your CEO receiving an email from your IT department asking him to reset his password. That’s harpooning.
[I] Lookup IP Address (nslookup).
This command will find the unique address for a website.
Hackers use it to gather information during the reconnaissance stage of an attack. Example Commands:
BashYourbank.com - nslookup
[K] Keylogger
These keyloggers secretly track your keystrokes.
Every password you type can be sent to hackers without you even knowing.
[L] Log Sanitization
An incorrect output sanitization could expose your logs.
Logs that are not secured may leak sensitive information.
[M] Malware
Malware is a collection of viruses, trojans, worms, and spyware that are designed to steal or harm data.
National Vulnerability Database
TheThe
database is used by security experts to identify and fix software weaknesses before hackers.
[O] Open Redirect
Open Redirects Trick users into visiting malicious sites by hiding bad links within trusted websites
[P] Penetration Testing
This is also known as pen-testing. It simulates a cyberattack to test the system’s security.
Imagine hiring someone to break into your system before criminals do.
Quality Assurance vs. Quality Control in Security
Both are important in ensuring secure software. QA focuses more on processes, whereas QC focuses more on the final product.
Ransomware [R]
The ransomware locks up your files and requires payment to unlock.
Cities, hospitals, schools, and even entire cities have been held as hostages.
[S] Spoofing
Spoofing is when you pretend to be someone else—by email, phone, or website.
A scammer sends an email that looks like it came from your boss.
[T] Trojan Horse
A Trojan is hidden inside an app or file that looks normal. Once it’s opened, the Trojan can steal all your data.
Vulnerability Assessment Tools
These tools scan for weaknesses. Appknox can be used to scan mobile apps.
Step-by-Step—How Hackers Really Use These Terms
Follow a real-life example based upon the TGT Organization case study.
-
Reconnaissance: A hacker uses traceroute and nslookup to locate the server.
-
Port scanning: These tools scan for open ports using Nmap (e.g., SSH on port 22).
-
Exploit and Payload: These hackers use Metasploit in order to exploit a vulnerability known by the attackers.
-
Daisy chaining: By compromising one machine, hackers can access systems in the network.
-
Persistence: They install a bit to maintain access.
-
Zero-Day Attack: When TGT is unaware of the vulnerability, it becomes a zero-day attack.
Learn these terms to understand why they are important
As with learning road signs, understanding cybersecurity acronyms will help you avoid dangers. Whether you run a business, manage a blog, or shop online—understanding these words can save you from serious trouble.
Cyber Security Terms and Terminologies in PDF
You can download our Cybersecurity Terms and Terminologies in PDF with images and definitions.
Cybersecurity glossary FAQs: Answers to your questions
What are some of the most common cybersecurity terms that I should be familiar with as a newbie?
Firewall, malware (including phishing), botnet, spoofing, and DDoS are all good places to start. This is the foundation for understanding advanced threats.
Have you created a list of cyber words that is suitable for children or non-technical users?
Yes! You can use a simplified glossary, such as Norton, to learn terms with examples and pictures.
What are some important 6-letter cybersecurity words?
Yes! Some key examples include:
-
Trojan
-
Exploit
-
Phishing
Where can I get a complete list of security terms and a dictionary of cybersecurity?
Use resources such as the Appknox Security Glossary.
What are 50 words that describe cybersecurity to you?
Yes! Here is a short list:
Malware, firewalls, APIs, penetrations, phishing, botnets, ransomware, spyware, and encryption. Brute Force. Trojans. Keyloggers. Exploit. Threat. Logs. DNS Spoofing. Clickjacking. Logs. SQL Injection. Command Injection. Rootkit. Worm. Backdoor. Access Control. Session Hijack. Open Redirect. Audit Trail. Bit, Nmap. SSH. Putty
Are you ready to take action?
Cybersecurity terminology is only the beginning. Appknox’s tools will help you protect your mobile apps, devices, and more. From API Security to Penetration Testing.