100 Cybersecrity Keywords and Definitions
100 Cybersecrity Keywords and Definitions
com/in/michael-tchuindjang-38829317b/
11 SIEM Security Information and Event Management provides real-time analysis of security
alerts generated by network hardware and applications.
12 SSL/TLS Protocols for securing communications over a computer network.
13 Encryption The process of encoding data to prevent unauthorized access.
14 VPN Tunneling A method of sending encrypted data over a network.
15 Port Scanning The act of systematically scanning a computer's ports to find vulnerabilities.
16 VLAN Virtual Local Area Network divides a network into multiple virtual networks for security
and organization.
17 NAT Network Address Translation allows a network to use one set of IP addresses for internal
traffic and another for external traffic.
18 Proxy Server Acts as an intermediary for requests from clients seeking resources from other servers.
19 Packet Sniffing The practice of monitoring and capturing all data packets passing through a given
network.
20 DDoS Protection Measures to protect a network or server from Distributed Denial-of- Service attacks.
21 Bandwidth The maximum rate of data transfer across a given path.
22 Latency The delay before a transfer of data begins following an instruction for its transfer.
23 Load Balancer A device that distributes network or application traffic across multiple servers to improve
responsiveness and availability.
24 Content Filter Software that screens and restricts the content delivered over the web to a user.
25 SSL Inspection The process of decrypting SSL/TLS encrypted traffic to inspect its content for security
threats.
Page | 2
Michael Tchuindjang https://www.linkedin.com/in/michael-tchuindjang-38829317b/
26 ACL (Access Control A set of rules that controls the incoming and outgoing network traffic on a device or
List) network, based on a set of criteria.
27 ARP (Address A protocol used to map an IP address to a physical machine address (MAC address) on a
Resolution Protocol) local area network.
28 BGP (Border Gateway The protocol underlying the global routing system of the internet, managing how packets
Protocol) get routed from network to network through the exchange of routing and reachability
information among edge routers.
29 Botnet A network of private computers infected with malicious software and controlled as a
group without the owners' knowing, often to send spam or participate in DDoS attacks.
30 CIDR (Classless Inter- A method for allocating IP addresses and IP routing that is more flexible than older
Domain Routing) systems like classful networking.
31 DDoS (Distributed An attack that attempts to disrupt the normal traffic of a targeted server, service, or
Denial of Service) network by overwhelming the target or its surrounding infrastructure with a flood of
Internet traffic.
32 DHCP (Dynamic Host A network management protocol used on IP networks whereby a DHCP server
Configuration dynamically assigns an IP address and other network configuration parameters to each
Protocol) device on a network.
33 DNS (Domain Name The hierarchical and decentralized naming system used to identify computers, services,
System) and other resources reachable through the internet or other IP networks by translating
human-friendly domain names to machine-readable IP addresses.
Page | 3
Michael Tchuindjang https://www.linkedin.com/in/michael-tchuindjang-38829317b/
34 DPI (Deep Packet A form of computer network packet filtering that examines the data part (and possibly
Inspection) also the header) of a packet as it passes an inspection point, searching for non-compliance
with or violations of protocol, viruses, spam, intrusions, or defined criteria.
35 EDR (Endpoint A cybersecurity technology that addresses the need for continuous monitoring and
Detection and response to advanced threats, specifically focusing on endpoint devices.
Response)
36 Firewall A network security system that monitors and controls incoming and outgoing network
traffic based on predetermined security rules.
37 Honeypot A security mechanism set to detect, deflect, or, in some manner, counteract attempts at
unauthorized use of information systems, essentially a trap to catch cyber attackers.
38 IDS (Intrusion A device or software application that monitors a network or systems for malicious activity
Detection System) or policy violations.
39 IPS (Intrusion An extension of IDS that not only detects but also prevents identified threats.
Prevention System)
40 IPv4/IPv6 Internet Protocol version 4 and version 6 are the fourth and sixth versions of the Internet
Protocol, respectively, used to identify devices on a network through an addressing
system.
41 MAC Address (Media A unique identifier assigned to a network interface controller (NIC) for use as a network
Access Control address in communications within a network segment.
Address)
42 Malware Any software intentionally designed to cause damage to a computer, server, client, or
computer network.
Page | 4
Michael Tchuindjang https://www.linkedin.com/in/michael-tchuindjang-38829317b/
43 NAT (Network A method of remapping one IP address space into another by modifying network address
Address Translation) information in the IP header of packets while they are in transit across a traffic routing
device.
44 NIDS (Network A system that analyzes incoming network traffic to identify any suspicious patterns that
Intrusion Detection may indicate a network or system attack.
System)
45 NIPS (Network A system that not only detects but also prevents network attacks by blocking detected
Intrusion Prevention malicious traffic.
System)
46 OSI Model (Open A conceptual framework used to understand network interactions in seven layers:
Systems physical, data link, network, transport, session, presentation, and application.
Interconnection
Model)
47 Phishing A cyber-attack employing deceptive communications, typically email, aimed at tricking
individuals into revealing personal information, installing malware, or opening links to
infected websites.
48 Ransomware A type of malicious software designed to block access to a computer system or data,
typically by encrypting it, until a sum of money is paid.
49 SIEM (Security A set of integrated tools designed to provide a comprehensive and real- time view of the
Information and Event security posture of an organization by collecting, analyzing, and presenting security data
Management) from various sources.
Page | 5
Michael Tchuindjang https://www.linkedin.com/in/michael-tchuindjang-38829317b/
50 SSL/TLS (Secure Cryptographic protocols designed to provide communications security over a computer
Sockets Layer / network, widely used for web browsers and other applications that require data to be
Transport Layer securely exchanged.
Security)
51 Subnet A logical subdivision of an IP network, breaking down a large network into smaller,
manageable pieces.
52 TCP/IP (Transmission The basic communication language or set of protocols for the Internet.
Control
Protocol/Internet
Protocol)
53 Threat Intelligence Evidence-based knowledge, including context, mechanisms, indicators, implications, and
actionable advice, about an existing or emerging menace or hazard to assets that can be
used to inform decisions regarding the subject's response to that menace or hazard.
54 VLAN (Virtual Local A method to create independent networks within a physical network, improving the
Area Network) management and security of data traffic.
55 VPN (Virtual Private A service that encrypts your internet traffic and protects your online identity by hiding
Network) your IP address, making your internet activity more secure.
56 WAF (Web Application A specific form of application firewall that filters, monitors, and blocks HTTP traffic to
Firewall) and from a web service.
57 XSS (Cross-Site A security vulnerability typically found in web applications, allowing attackers to inject
Scripting) malicious scripts into content from otherwise trusted
Page | 6
Michael Tchuindjang https://www.linkedin.com/in/michael-tchuindjang-38829317b/
websites.
58 Zero Day A vulnerability in software, hardware, or firmware that is unknown to the party or
parties responsible for patching or otherwise fixing the vulnerability.
59 MITM (Man In The An attack where the attacker secretly intercepts and alters the communication between
Middle Attack) two parties who believe they are directly communicating with each other.
60 SOC (Security A centralized unit that deals with security issues on an organizational and technical level,
Operations Center) focusing on real-time monitoring, detection, analysis, and response to cybersecurity
incidents.
61 Encryption The process of converting information or data into a code to prevent unauthorized access.
62 Threat Hunting The proactive search for malicious actors or activities that are hidden within a network
and might not be detected by traditional security tools.
63 Vulnerability A weakness which can be exploited by a threat actor, such as an attacker, to perform
unauthorized actions within a computer system.
64 Penetration Testing The practice of testing a computer system, network, or web application to find
vulnerabilities that an attacker could exploit.
65 Social Engineering The use of deception to manipulate individuals into divulging confidential or personal
information that may be used for fraudulent purposes.
66 2FA (Two-Factor A security process in which users provide two different authentication factors to verify
Authentication) themselves, enhancing the security of their account and the network.
67 Incident Response The organized approach to addressing and managing the aftermath of a security breach or
cyber attack, aiming to limit damage and reduce recovery time and costs.
Page | 7
Michael Tchuindjang https://www.linkedin.com/in/michael-tchuindjang-38829317b/
68 Patch Management The process of distributing and applying updates to software, including security patches,
to protect against vulnerabilities exploited by hackers.
69 Rootkit A collection of malicious software tools that enable unauthorized access to a computer or
area of its software and often hide the existence of certain processes or programs.
70 Sandboxing A security technique for separating running programs, usually in an effort to mitigate
system failures or software vulnerabilities from spreading.
71 Spear Phishing A more targeted version of phishing, where the attacker chooses specific individuals or
organizations to deceive into providing confidential information.
72 Whaling A specific form of phishing targeted at senior executives and other high- profile targets
within businesses.
73 Vishing Voice phishing where attackers use phone calls to deceive individuals into providing
personal information or financial details.
74 Smishing SMS phishing where attackers send text messages to lure victims into clicking on a
malicious link or providing personal information.
75 SQL Injection An attack that exploits vulnerabilities in data-driven applications to execute malicious
SQL statements, compromising the security of a database.
76 Cross-Site Request An attack that forces an end user to execute unwanted actions on a web application in
Forgery (CSRF) which they're currently authenticated.
77 Spyware Software that enables a user to obtain covert information about another's computer
activities by transmitting data covertly from their hard drive.
78 Adware Any software application in which advertising is displayed while the program is running.
Page | 8
Michael Tchuindjang https://www.linkedin.com/in/michael-tchuindjang-38829317b/
These advertisements can be in the form of a pop-up or some other form of advertising.
79 Trojan Horse A type of malware that is often disguised as legitimate software. Trojans can be
employed by cyber-thieves and hackers trying to gain access to users' systems.
80 Worm A standalone malware computer program that replicates itself in order to spread to other
computers.
81 Keylogger A type of surveillance technology used to monitor and record each keystroke typed on a
specific computer's keyboard.
82 Drive-By Download Unintended download of computer software from the Internet, which occurs when
visiting a website, viewing an email message, or clicking on a deceptive pop-up window.
83 Brute Force Attack An attempt to crack a password or username or find a hidden web page, or find the key
used to encrypt a message, using a trial-and-error approach.
84 Dictionary Attack A method of breaking into a password-protected computer or server by systematically
entering every word in a dictionary as a password.
85 Session Hijacking The exploitation of a valid computer session to gain unauthorized access to information
or services in a computer system.
86 Credential Stuffing A type of cyberattack where stolen account credentials, typically consisting of lists of
usernames and/or email addresses and the corresponding passwords, are used to gain
unauthorized access to user accounts through large-scale
automated login requests directed against a web application.
Page | 9
Michael Tchuindjang https://www.linkedin.com/in/michael-tchuindjang-38829317b/
87 Clickjacking A technique used by attackers to trick users into clicking on something different from
what the user perceives, potentially revealing confidential information or allowing others
to take control of their computer.
88 Cryptojacking Unauthorized use of someone else's computer to mine cryptocurrency.
89 Watering Hole Attack A security exploit in which the attacker seeks to compromise a specific group of end users
by infecting websites that members of the group are known to visit.
90 Side-Channel Attack Any attack based on information gained from the physical implementation of a computer
system, rather than weaknesses in the implemented software.
91 Supply Chain Attack Occurs when someone infiltrates your system through an outside partner or provider with
access to your systems and data.
92 BEC (Business Email A form of phishing attack where a cybercriminal uses compromised email credentials or
Compromise) spoofs a corporate email address to defraud the company.
93 Replay Attack A network attack in which a valid data transmission is maliciously or fraudulently
repeated or delayed.
94 Buffer Overflow An anomaly where a program, while writing data to a buffer, overruns the buffer's
boundary and overwrites adjacent memory locations.
95 Backdoor A method of bypassing normal authentication procedures, often secretly and for malicious
purposes.
96 Ping of Death A type of attack on a computer system that involves sending a malformed or otherwise
malicious ping to a computer.
Page | 10
Michael Tchuindjang https://www.linkedin.com/in/michael-tchuindjang-38829317b/
97 Bluesnarfing The unauthorized access of information from a wireless device through a Bluetooth
connection.
98 Bluejacking The practice of sending unsolicited messages between Bluetooth-enabled devices.
99 Evil Twin A fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on
wireless communications.
100 SOAR (Security Set of technologies that enable organizations to collect security threat data and alerts from
Orchestration, various sources, automate incident response processes, and orchestrate actions across
Automation, and multiple security tools and systems in a coordinated manner.
Response)
Page | 11