Cybersecurity 101: Essential Terms You Need to Know

Common Threats & Attacks 🚨

  • Malware 🦠: Malicious software (e.g., viruses, worms, ransomware) designed to harm systems or steal data.
  • Phishing 🎣: Fraudulent emails/messages impersonating trusted entities to steal credentials or deploy malware.
  • Ransomware πŸ”’: Malware that encrypts a victim’s data, demanding payment for decryption.
  • Zero-Day Exploit πŸ’₯: An attack targeting a previously unknown vulnerability (no patch exists).
  • DDoS Attack 🌐πŸ’₯: Distributed Denial of Service: Overwhelming a system with traffic to crash it.
  • Social Engineering 🎭: Manipulating humans into divulging sensitive information (e.g., pretexting, baiting).
  • Man-in-the-Middle (MitM) πŸ•΅οΈ: Intercepting communication between two parties to eavesdrop or alter data.
  • Advanced Persistent Threat (APT) 🎯: Long-term, stealthy attacks by skilled adversaries (e.g., nation-states).
  • Botnet πŸ€–πŸŒ: A network of infected devices controlled by attackers for large-scale attacks.
  • Spyware πŸ‘οΈ: Software that secretly monitors user activity (e.g., keyloggers).

Defensive Measures & Tools πŸ›‘οΈ

  • Firewall 🧱: A network security system that monitors and filters incoming/outgoing traffic.
  • Antivirus/Anti-Malware 🧹: Software to detect, block, and remove malicious programs.
  • Intrusion Detection System (IDS) 🚨: Monitors networks/systems for suspicious activity and alerts admins.
  • Intrusion Prevention System (IPS) πŸ›‘: Actively blocks detected threats in real-time.
  • VPN (Virtual Private Network) πŸŒπŸ”’: Encrypts internet traffic to protect privacy and bypass geo-restrictions.
  • Multi-Factor Authentication (MFA) πŸ”‘πŸ“±: Requires multiple verification methods (e.g., password + SMS code).
  • Encryption πŸ”: Scrambling data into unreadable format without a decryption key.
  • Penetration Testing (Pen Testing) πŸ•΅οΈβ€β™‚οΈ: Simulated attacks to identify vulnerabilities in a system.
  • Patch Management πŸ› οΈ: Regularly updating software to fix security flaws.
  • Zero Trust 🚫🀝: Security model assuming no user/device is trusted by default.

Vulnerabilities & Risks ⚠️

  • Vulnerability πŸ”“: A weakness in a system that can be exploited by attackers.
  • Exploit πŸ’£: A technique or tool that leverages a vulnerability to cause harm.
  • Backdoor πŸšͺ: A hidden method to bypass authentication and gain unauthorized access.
  • Rootkit πŸ‘»: Malware that grants attackers privileged access while hiding its presence.
  • Attack Surface πŸ—ΊοΈ: All potential points where an unauthorized user can access a system.

Identity & Access Management πŸ‘€πŸ”‘

  • Authentication βœ…: Verifying a user’s identity (e.g., passwords, biometrics).
  • Authorization πŸ”‘: Granting permissions to access resources based on user roles.
  • Least Privilege πŸ”’: Restricting user access to only what’s necessary for their role.
  • Single Sign-On (SSO) πŸ”‘πŸšͺ: Allows users to access multiple systems with one set of credentials.

Networking & Protocols 🌐

  • SSL/TLS πŸ”’πŸŒ: Encryption protocols for securing internet communications (HTTPS).
  • DNS Spoofing 🌐➑️❌: Redirecting users to fake websites by corrupting DNS queries.
  • Port Scanning πŸ”πŸŒ: Probing a network to identify open ports and services.
  • Honeypot 🍯: A decoy system designed to lure and study attackers.

Data Protection & Compliance πŸ“„πŸ”’

  • Data Breach πŸš¨πŸ“„: Unauthorized access/exposure of sensitive data.
  • GDPR πŸ‡ͺπŸ‡ΊπŸ“„: EU regulation for data privacy and protection.
  • HIPAA πŸ‡ΊπŸ‡ΈπŸ₯: U.S. law protecting healthcare data.
  • PCI DSS πŸ’³πŸ”’: Security standard for organizations handling credit card data.
  • Data Loss Prevention (DLP) πŸ›‘πŸ“„: Tools to prevent sensitive data from being leaked or stolen.

Incident Response πŸš¨πŸ› οΈ

  • SOC (Security Operations Center) 🚨πŸ–₯️: Team that monitors and responds to security incidents.
  • SIEM (Security Information and Event Management) πŸ“ŠπŸš¨: Aggregates and analyzes logs for threat detection.
  • Digital Forensics πŸ”πŸ’»: Investigating cybercrimes by analyzing digital evidence.
  • Threat Intelligence 🧠🚨: Data about emerging threats used to improve defenses.

Miscellaneous Terms πŸŒβ“

  • Dark Web πŸŒ‘πŸŒ: Hidden part of the internet used for illegal activities.
  • White Hat Hacker πŸ˜‡πŸ’»: Ethical hacker who identifies vulnerabilities responsibly.
  • Black Hat Hacker πŸ˜ˆπŸ’»: Malicious hacker exploiting systems for personal gain.
  • Brute Force Attack πŸ”¨πŸ”‘: Guessing passwords through trial-and-error.
  • CVE (Common Vulnerabilities and Exposures) πŸ“„πŸš¨: Publicly listed cybersecurity vulnerabilities.
  • Sandboxing πŸ“¦πŸ”’: Isolating suspicious programs in a secure environment for analysis.
  • Whitelisting/Blacklisting βœ…βŒ: Allowing/blocking specific applications, IPs, or users.
  • Cyber Kill Chain β›“οΈπŸŽ―: Framework outlining stages of a cyberattack (recon to data exfiltration).

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *