Cybersecurity Glossary

Access Control

Ensures that resources are only granted to authorized users. Includes mechanisms like Access Control Lists (ACLs) and various authentication methods.

Advanced Encryption Standard (AES)

A symmetric encryption algorithm widely used for securing sensitive information.

Advanced Persistent Threat (APT)

A sophisticated, long-term cyber attack targeting specific entities.

Antivirus Software

Programs designed to detect, prevent, and remove malicious software.

Botnet

A network of compromised computers controlled by an attacker, often used for malicious activities.

Buffer Overflow

A type of software vulnerability where a program writes data beyond the allocated buffer's boundaries.

Cryptography

The practice of secure communication techniques that protect information from unauthorized access.

DDoS (Distributed Denial of Service)

An attack that floods a target with traffic from multiple sources to overwhelm and disrupt services.

Encryption

The process of encoding information to protect its confidentiality.

Firewall

A network security system that monitors and controls incoming and outgoing network traffic.

Intrusion Detection System (IDS)

A system that monitors network traffic for suspicious activity and policy violations.

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

Phishing

A social engineering attack that tricks users into revealing sensitive information.

Ransomware

Malware that encrypts a victim's files, demanding payment for the decryption key.

Social Engineering

Psychological manipulation techniques used to trick people into divulging confidential information.

Two-Factor Authentication (2FA)

An extra layer of security that requires two different authentication factors.

Virtual Private Network (VPN)

A service that creates a secure, encrypted connection over a less secure network.

Zero-Day Exploit

An attack that targets a previously unknown vulnerability, often before a patch is available.