In the ever-evolving world of cyber security, understanding key terminology is essential to protect your business and personal data. This comprehensive cyber security glossary provides clear and concise definitions of the most important terms, concepts, and threats in the digital security landscape. From ransomware and phishing to zero-day exploits and encryption, this guide is designed to help you stay informed and secure. Whether you're an IT professional, a business owner, or just someone looking to enhance your cyber security knowledge, this glossary is your essential resource for comprehensive cyber security awareness.
A hacker who violates security for personal gain, malicious intent, or to cause damage to systems or data.
Example: A black hat hacker breaches a company's database and sells the stolen customer data on the dark web.
See also: White Hat Hacker, Hacker
A person who uses technical skills to access systems or data. Hackers can be ethical (white hat) or malicious (black hat).
Example: A white hat hacker finds vulnerabilities in a company's system and helps them fix it.
See also: White Hat Hacker, Black Hat Hacker
An ethical hacker who uses their skills to identify and fix security vulnerabilities in systems, helping organisations improve security.
Example: A company hires a white hat hacker to conduct a security audit and discover weaknesses before malicious hackers do.
See also: Black Hat Hacker, Hacker
A prolonged, targeted cyberattack where an intruder gains unauthorised access to a network and remains undetected for an extended period, often to steal sensitive data.
Example: A hacker group infiltrates a government agency's network and remains hidden for months, slowly exfiltrating classified documents.
Techniques used to prevent or hinder digital forensic investigations by erasing or obscuring evidence.
Example: A hacker uses anti-forensics tools to delete logs and hide their tracks after a data breach.
A hidden method within software, hardware, or a system that allows someone to bypass normal authentication or security controls. Backdoors can be intentionally coded by developers for maintenance purposes or maliciously created by attackers to gain unauthorised access.
Example: A software developer includes a backdoor for troubleshooting, while a hacker might install a backdoor in a compromised server to maintain covert access.
A trial-and-error method where an attacker tries every possible password combination to gain access to an account.
Example: A hacker uses automated software to guess the password to your email by systematically trying every combination of letters and numbers.
Any deliberate attempt to damage, disrupt, or gain unauthorised access to computer systems, networks, or data.
Example: A hacker launches a ransomware attack on a hospital, encrypting patient records until a ransom is paid.
An attack where a system is overwhelmed with traffic or requests, making it unavailable to legitimate users.
Example: A hacker floods a website with so many requests that it crashes and can't be accessed.
See also: DDoS (Distributed Denial-of-Service)
An attack where a hacker intercepts private communications, such as emails or phone calls, to steal sensitive information.
Example: An attacker uses a packet sniffer to capture login credentials sent over an unencrypted Wi-Fi network.
An unauthorised Wi-Fi access point installed on a network, often used by attackers to intercept traffic.
Example: A hacker sets up a rogue access point in a coffee shop to steal data from users who connect.
An attack where hackers compromise websites frequently visited by their target audience to infect visitors with malware.
Example: A hacker infects a popular industry forum with malware, knowing employees from specific companies frequently visit the site.
A device that has been compromised by malware and is controlled remotely by an attacker, often used in botnets for cyber attacks.
Example: A hacker uses thousands of zombie computers to launch a Distributed Denial-of-Service (DDoS) attack on a website.
See also: Botnet