In the ever-evolving world of cyber security, understanding key terminology is essential to protect your business and personal data. This comprehensive cyber security glossary provides clear and concise definitions of the most important terms, concepts, and threats in the digital security landscape. From ransomware and phishing to zero-day exploits and encryption, this guide is designed to help you stay informed and secure. Whether you're an IT professional, a business owner, or just someone looking to enhance your cyber security knowledge, this glossary is your essential resource for comprehensive cyber security awareness.
A simulated cyber attack performed by security experts (ethical hackers) to identify vulnerabilities in a system or network.
Example: A company hires a penetration tester to attempt to break into their network, uncovering weak points that need to be secured.
See also: Penetration Tester
A cyber security professional who performs authorised hacking on an organisation's systems, networks, or applications to identify and help fix security vulnerabilities.
Example: A financial institution hires a penetration tester to attempt to break into its online banking platform. The tester discovers a vulnerability that allows unauthorised access to customer accounts and provides a report with recommendations to fix the issue.
See also: Penetration Testing