Outsmart. Outsecure. Outlast.

Cyber Security Glossary / Dictionary


Cyber Security Terms and Definitions


In the ever-evolving world of cyber security, understanding key terminology is essential to protect your business and personal data. This comprehensive cyber security glossary provides clear and concise definitions of the most important terms, concepts, and threats in the digital security landscape. From ransomware and phishing to zero-day exploits and encryption, this guide is designed to help you stay informed and secure. Whether you're an IT professional, a business owner, or just someone looking to enhance your cyber security knowledge, this glossary is your essential resource for comprehensive cyber security awareness.



Black Hat Hacker

A hacker who violates security for personal gain, malicious intent, or to cause damage to systems or data.

Example: A black hat hacker breaches a company's database and sells the stolen customer data on the dark web.

See also: White Hat Hacker, Hacker



Hacker

A person who uses technical skills to access systems or data. Hackers can be ethical (white hat) or malicious (black hat).

Example: A white hat hacker finds vulnerabilities in a company's system and helps them fix it.

See also: White Hat Hacker, Black Hat Hacker



White Hat Hacker

An ethical hacker who uses their skills to identify and fix security vulnerabilities in systems, helping organisations improve security.

Example: A company hires a white hat hacker to conduct a security audit and discover weaknesses before malicious hackers do.

See also: Black Hat Hacker, Hacker



Advanced Persistent Threat (APT)

A prolonged, targeted cyberattack where an intruder gains unauthorised access to a network and remains undetected for an extended period, often to steal sensitive data.

Example: A hacker group infiltrates a government agency's network and remains hidden for months, slowly exfiltrating classified documents.



Anti-Forensics

Techniques used to prevent or hinder digital forensic investigations by erasing or obscuring evidence.

Example: A hacker uses anti-forensics tools to delete logs and hide their tracks after a data breach.



Backdoor / Back Door

A hidden method within software, hardware, or a system that allows someone to bypass normal authentication or security controls. Backdoors can be intentionally coded by developers for maintenance purposes or maliciously created by attackers to gain unauthorised access.

Example: A software developer includes a backdoor for troubleshooting, while a hacker might install a backdoor in a compromised server to maintain covert access.



Brute Force Attack

A trial-and-error method where an attacker tries every possible password combination to gain access to an account.

Example: A hacker uses automated software to guess the password to your email by systematically trying every combination of letters and numbers.



Cyber Attack / Cyberattack

Any deliberate attempt to damage, disrupt, or gain unauthorised access to computer systems, networks, or data.

Example: A hacker launches a ransomware attack on a hospital, encrypting patient records until a ransom is paid.



DoS (Denial-of-Service)

An attack where a system is overwhelmed with traffic or requests, making it unavailable to legitimate users.

Example: A hacker floods a website with so many requests that it crashes and can't be accessed.

See also: DDoS (Distributed Denial-of-Service)



Eavesdropping Attack

An attack where a hacker intercepts private communications, such as emails or phone calls, to steal sensitive information.

Example: An attacker uses a packet sniffer to capture login credentials sent over an unencrypted Wi-Fi network.



Rogue Access Point

An unauthorised Wi-Fi access point installed on a network, often used by attackers to intercept traffic.

Example: A hacker sets up a rogue access point in a coffee shop to steal data from users who connect.



Watering Hole Attack

An attack where hackers compromise websites frequently visited by their target audience to infect visitors with malware.

Example: A hacker infects a popular industry forum with malware, knowing employees from specific companies frequently visit the site.



Zombie Computer

A device that has been compromised by malware and is controlled remotely by an attacker, often used in botnets for cyber attacks.

Example: A hacker uses thousands of zombie computers to launch a Distributed Denial-of-Service (DDoS) attack on a website.

See also: Botnet