In the ever-evolving world of cyber security, understanding key terminology is essential to protect your business and personal data. This comprehensive cyber security glossary provides clear and concise definitions of the most important terms, concepts, and threats in the digital security landscape. From ransomware and phishing to zero-day exploits and encryption, this guide is designed to help you stay informed and secure. Whether you're an IT professional, a business owner, or just someone looking to enhance your cyber security knowledge, this glossary is your essential resource for comprehensive cyber security awareness.
A group of security professionals that simulates real-world attacks on an organisation to test its defences and identify vulnerabilities.
Example: The red team launches a mock phishing campaign to see if employees will click malicious links, helping improve training and awareness.
See also: Blue Team, Purple Team
A group responsible for defending an organisation's systems and networks by identifying and mitigating security threats.
Example: The blue team monitors network traffic for suspicious activity and responds to any detected threats.
See also: Red Team, Purple Team
A group of cyber security professionals that integrates the functions of both the Red Team (attackers) and Blue Team (defenders) to enhance an organisation's security posture. The Purple Team facilitates collaboration and information sharing between the Red and Blue Teams to identify vulnerabilities, improve defences, and ensure effective threat mitigation. Their role is to ensure that offensive testing (Red Team) directly informs defensive strategies (Blue Team).
Example: After the Red Team conducts a simulated phishing attack and successfully compromises user credentials, the Purple Team helps the Blue Team improve email filtering and employee training to prevent future incidents.