Cybersecurity 101: Essential Terms You Need to Know
Common Threats & Attacks π¨
- Malware π¦ : Malicious software (e.g., viruses, worms, ransomware) designed to harm systems or steal data.
- Phishing π£: Fraudulent emails/messages impersonating trusted entities to steal credentials or deploy malware.
- Ransomware π: Malware that encrypts a victimβs data, demanding payment for decryption.
- Zero-Day Exploit π₯: An attack targeting a previously unknown vulnerability (no patch exists).
- DDoS Attack ππ₯: Distributed Denial of Service: Overwhelming a system with traffic to crash it.
- Social Engineering π: Manipulating humans into divulging sensitive information (e.g., pretexting, baiting).
- Man-in-the-Middle (MitM) π΅οΈ: Intercepting communication between two parties to eavesdrop or alter data.
- Advanced Persistent Threat (APT) π―: Long-term, stealthy attacks by skilled adversaries (e.g., nation-states).
- Botnet π€π: A network of infected devices controlled by attackers for large-scale attacks.
- Spyware ποΈ: Software that secretly monitors user activity (e.g., keyloggers).
Defensive Measures & Tools π‘οΈ
- Firewall π§±: A network security system that monitors and filters incoming/outgoing traffic.
- Antivirus/Anti-Malware π§Ή: Software to detect, block, and remove malicious programs.
- Intrusion Detection System (IDS) π¨: Monitors networks/systems for suspicious activity and alerts admins.
- Intrusion Prevention System (IPS) π: Actively blocks detected threats in real-time.
- VPN (Virtual Private Network) ππ: Encrypts internet traffic to protect privacy and bypass geo-restrictions.
- Multi-Factor Authentication (MFA) ππ±: Requires multiple verification methods (e.g., password + SMS code).
- Encryption π: Scrambling data into unreadable format without a decryption key.
- Penetration Testing (Pen Testing) π΅οΈββοΈ: Simulated attacks to identify vulnerabilities in a system.
- Patch Management π οΈ: Regularly updating software to fix security flaws.
- Zero Trust π«π€: Security model assuming no user/device is trusted by default.
Vulnerabilities & Risks β οΈ
- Vulnerability π: A weakness in a system that can be exploited by attackers.
- Exploit π£: A technique or tool that leverages a vulnerability to cause harm.
- Backdoor πͺ: A hidden method to bypass authentication and gain unauthorized access.
- Rootkit π»: Malware that grants attackers privileged access while hiding its presence.
- Attack Surface πΊοΈ: All potential points where an unauthorized user can access a system.
Identity & Access Management π€π
- Authentication β : Verifying a userβs identity (e.g., passwords, biometrics).
- Authorization π: Granting permissions to access resources based on user roles.
- Least Privilege π: Restricting user access to only whatβs necessary for their role.
- Single Sign-On (SSO) ππͺ: Allows users to access multiple systems with one set of credentials.
Networking & Protocols π
- SSL/TLS ππ: Encryption protocols for securing internet communications (HTTPS).
- DNS Spoofing πβ‘οΈβ: Redirecting users to fake websites by corrupting DNS queries.
- Port Scanning ππ: Probing a network to identify open ports and services.
- Honeypot π―: A decoy system designed to lure and study attackers.
Data Protection & Compliance ππ
- Data Breach π¨π: Unauthorized access/exposure of sensitive data.
- GDPR πͺπΊπ: EU regulation for data privacy and protection.
- HIPAA πΊπΈπ₯: U.S. law protecting healthcare data.
- PCI DSS π³π: Security standard for organizations handling credit card data.
- Data Loss Prevention (DLP) ππ: Tools to prevent sensitive data from being leaked or stolen.
Incident Response π¨π οΈ
- SOC (Security Operations Center) π¨π₯οΈ: Team that monitors and responds to security incidents.
- SIEM (Security Information and Event Management) ππ¨: Aggregates and analyzes logs for threat detection.
- Digital Forensics ππ»: Investigating cybercrimes by analyzing digital evidence.
- Threat Intelligence π§ π¨: Data about emerging threats used to improve defenses.
Miscellaneous Terms πβ
- Dark Web ππ: Hidden part of the internet used for illegal activities.
- White Hat Hacker ππ»: Ethical hacker who identifies vulnerabilities responsibly.
- Black Hat Hacker ππ»: Malicious hacker exploiting systems for personal gain.
- Brute Force Attack π¨π: Guessing passwords through trial-and-error.
- CVE (Common Vulnerabilities and Exposures) ππ¨: Publicly listed cybersecurity vulnerabilities.
- Sandboxing π¦π: Isolating suspicious programs in a secure environment for analysis.
- Whitelisting/Blacklisting β β: Allowing/blocking specific applications, IPs, or users.
- Cyber Kill Chain βοΈπ―: Framework outlining stages of a cyberattack (recon to data exfiltration).