30 Cyber Security Terms and Hashtags

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field is becoming increasingly significant due to the increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.

Keywords / Hashtags

1.Cloud computing

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.

2.Software

Software is a collection of instructions and data that tell a computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work.

3.Domain

A domain name is an identification string that defines a realm of administrative autonomy, authority or control within the Internet. Domain names are used in various networking contexts and for application-specific naming and addressing purposes.

4.Virtual Private Network (VPN)

VPN stands for "Virtual Private Network" and describes the opportunity to establish a protected network connection when using public networks. VPNs encrypt your internet traffic and disguise your online identity. This makes it more difficult for third parties to track your activities online and steal data.

5.IP Address

An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing.

6.Exploit

An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic.

7.Breach

A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak, information leakage and also data spill.

8.Firewall

A firewall is a program or hardware device that analyzes incoming and outgoing network traffic and, based on predetermined rules, creates a barrier to block viruses and attackers. If any incoming information is flagged by filters, it's blocked.

9.Malware

Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and scareware.

10.Virus

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus. Computer viruses generally require a host program.

11.Ransomware

Ransomware is malware that employs encryption to hold a victim's information at ransom. A user or organization's critical data is encrypted so that they cannot access files, databases, or applications. A ransom is then demanded to provide access.

12.Trojan horse

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

13.Worm

A worm virus is a malicious, self-replicating program that can spread throughout a network without human assistance. ... The worm program operates alone. The worm is often transmitted via file-sharing networks, information-transport features, email attachments or by clicking links to malicious websites.

14.Bot/Botnet

Zombie computers, or bots, refer to each malware-infected user device that's been taken over for use in the botnet. ... Infect — user devices are infected with malware that can take control of their device. Activate — hackers mobilize infected devices to carry out attacks.

15.Spyware

Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.

16.Rootkit

A rootkit is a type of malware designed to give hackers access to and control over a target device. Although most rootkits affect the software and the operating system, some can also infect your computer's hardware and firmware.

17.DDoS

In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

18.Phishing or Spear Phishing

Phishing and spear phishing are very common forms of email attack designed to you into performing a specific action—typically clicking on a malicious link or attachment. The difference between them is primarily a matter of targeting. ... Spear phishing emails are carefully designed to get a single recipient to respond.

19.Encryption

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information.

20.BYOD

Bring your own device —also called bring your own technology, bring your own phone, and bring your own personal computer —refers to being allowed to use one's personally owned device, rather than being required to use an officially provided device. There are two major contexts in which this term is used.

21.Pen-testing

A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment.

22.Social Engineering

A technique used to manipulate and deceive people to gain sensitive and private information. Scams based on social engineering are built around how people think and act. So, once a hacker understands what motivates a person’s actions, they can usually retrieve exactly what they’re looking for – like financial data and passwords.

23.Clickjacking

Clickjacking is a malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while clicking on seemingly innocuous objects, including web pages.

24.Deepfake

An audio or video clip that has been edited and manipulated to seem real or believable. The most dangerous consequence of the popularity of deepfakes is that they can easily convince people into believing a certain story or theory that may result in user-behavior with a bigger impact as in political or financial.

25.White Hat

A white hat is an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems. Ethical hacking is a term meant to imply a broader category than just penetration testing.

26.Black Hat

Black hat: Hackers that break into the network to steal information that will be used to harm the owner or the users without consent. It’s entirely illegal.

27.Supply Chain Attack

Supply Chain attack is a cyber-attack which affects the organization by targeting less-secure elements in the supply network. Supply Chain attacks were already on the list of the 7 Cyber-security keywords last year, and still manages to maintain its place. Such attacks will continue to infiltrate into the supply chain through third party systems and services. Therefore, due to its weak security systems, those purchasing third party vendor products and services, must take extra caution.

28.Malicious emails

Receiving emails containing malware is not a new thing anymore. The Financial Security Institute warns us how malware email attacks are becoming more cunning and harder to block. Spear Phishing, a traditional method of attack which uses HWP and DOC documents, will not stop this year.

29.ReCAPTCHA

reCAPTCHA is a CAPTCHA system that enables web hosts to distinguish between human and automated access to websites. The original version asked users to decipher hard to read text or match images.

30.Keylogger

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program