Loading...
Plain-English definitions of cybersecurity terms
Two-Factor or Multi-Factor Authentication - Requiring additional verification beyond a password, such as a code from your phone.
Best practice backup strategy: 3 copies of your data, on 2 different types of media, with 1 copy stored offsite.
Physically isolating a computer or network from the internet to protect it from remote attacks.
Advanced Persistent Threat - A sophisticated, long-term cyber attack typically conducted by nation-states or well-funded criminal groups. APTs often target specific organizations for espionage or sabotage.
All the possible points where an attacker could try to enter a system. Reducing attack surface is a key security principle.
The process of verifying that someone is who they claim to be, typically through passwords, biometrics, or tokens.
A hidden method of bypassing normal authentication to gain access to a computer system. Backdoors can be built into software intentionally or installed by malware.
A network of compromised computers controlled by an attacker, often used to launch DDoS attacks or send spam.
Cybersecurity and Infrastructure Security Agency - US federal agency responsible for protecting critical infrastructure from cyber threats.
Using stolen username/password combinations from one breach to try to access other accounts, exploiting password reuse.
Common Vulnerabilities and Exposures - A standardized system for identifying and naming cybersecurity vulnerabilities.
Using cyber attacks to steal sensitive information, trade secrets, or intellectual property from governments, organizations, or individuals.
Distributed Denial of Service - An attack that floods a website or service with so much traffic that it becomes unavailable to legitimate users.
Domain Name System - The internet's phone book that translates website names (like google.com) into IP addresses computers can understand.
Converting data into a coded format that can only be read with the correct key. Protects data from unauthorized access.
A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules. Can be hardware or software.
Permanent software programmed into a device's hardware. Firmware updates patch security vulnerabilities in routers, cameras, etc.
A one-way mathematical function that converts data into a fixed-size string. Used to verify data integrity and store passwords securely.
The organized approach to detecting, containing, and recovering from a cybersecurity incident or breach.
Internet of Things - Physical devices connected to the internet, such as smart thermostats, cameras, and farm sensors.
Internet Protocol Address - A unique numerical label assigned to each device connected to a network. Like a mailing address for computers.
Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Includes viruses, worms, trojans, and ransomware.
A hacking group backed by or working on behalf of a government. Examples include Chinese APT groups and Russian GRU hackers.
Chinese law requiring companies and citizens to support, cooperate with, and collaborate in national intelligence work when requested.
US law that prohibits federal agencies from purchasing equipment from certain Chinese companies including Huawei, ZTE, Hikvision, and Dahua.
Dividing a network into smaller sections to limit access and contain potential breaches. Example: keeping IoT devices separate from computers.
Network Video Recorder / Digital Video Recorder - Devices that record and store video from security cameras.
Software that securely stores and generates unique passwords for all your accounts. Examples: 1Password, Bitwarden, LastPass.
A software update that fixes bugs or security vulnerabilities. Regular patching is essential for security.
Authorized simulated cyber attacks on a system to evaluate its security and find vulnerabilities before real attackers do.
A social engineering attack that uses fake emails, messages, or websites to trick people into revealing sensitive information like passwords or credit card numbers.
Power over Ethernet - Technology that delivers power and data through a single network cable. Common for security cameras.
A virtual point where network connections start and end. Different services use different ports (e.g., web traffic uses port 80/443).
Malware that encrypts your files and demands payment (ransom) to restore access. Major threat to farms, hospitals, and businesses.
A device that directs internet traffic between your home network and the outside internet. Often combined with WiFi access point.
Manipulating people into revealing confidential information or taking actions that compromise security. Exploits human psychology rather than technical vulnerabilities.
A targeted phishing attack directed at a specific individual or organization, often using personalized information to appear more legitimate.
Protocols that encrypt data transmitted over the internet. The 'S' in HTTPS means SSL/TLS is being used.
An attack that targets less-secure elements in a supply network to compromise the ultimate target. Example: compromising software updates.
An individual or group that performs malicious actions against computer systems. Includes hackers, nation-states, and insider threats.
Malware disguised as legitimate software. Unlike viruses, trojans don't replicate but can create backdoors for attackers.
Universal Plug and Play - A protocol that allows devices to automatically open ports on your router. Convenient but can create security risks.
Virtual Local Area Network - A way to create separate logical networks on the same physical network hardware.
Virtual Private Network - Creates an encrypted tunnel for your internet traffic, hiding your activity from your ISP and protecting you on public WiFi.
A weakness in a system that can be exploited by attackers to gain unauthorized access or cause harm.
WiFi Protected Access - Security protocols for wireless networks. WPA3 is the latest and most secure version.
A software vulnerability that is unknown to the vendor and has no available patch. Zero-day exploits are highly valuable to attackers.