Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks, unauthorized access, or damage. These attacks often aim to access, change, or destroy sensitive information, interrupt business processes, or extort money from users. Cybersecurity involves tools, technologies, and strategies to ensure data confidentiality, integrity, and availability.
The CIA Triad stands for Confidentiality, Integrity, and Availability.
Penetration Testing is a simulated cyber-attack conducted to identify security vulnerabilities in a system, application, or network. Security professionals, often called ethical hackers, mimic real-world attack techniques to uncover vulnerabilities before malicious attackers exploit them.
MFA is a security mechanism requiring users to provide two or more verification factors to gain access to a system. Examples include:
Phishing is a cyber-attack where attackers pose as legitimate entities to trick individuals into revealing sensitive information, such as login credentials or financial data, typically through emails, fake websites, or SMS.
Ransomware is a type of malware that encrypts a victim’s data and demands payment (ransom) to restore access. Notorious examples include WannaCry and CryptoLocker.
Social engineering manipulates individuals into divulging confidential information or performing actions that compromise security. Common methods include phishing, baiting, and pretexting.
A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predefined rules. It serves as a barrier between a trusted internal network and untrusted external sources.
A Distributed Denial of Service (DDoS) attack overwhelms a system, server, or network with massive traffic from multiple sources, rendering it unavailable to users. Tools like botnets are often used in such attacks.
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols that provide secure communication over networks, primarily used in HTTPS to encrypt web traffic.
The Principle of Least Privilege ensures that users or systems have only the minimum level of access or permissions necessary to perform their tasks, reducing potential damage from compromised accounts.
2FA is a subset of MFA that requires two verification methods, typically:
SQL Injection is a web attack where malicious SQL code is inserted into database queries, potentially accessing, modifying, or deleting sensitive data.
A Zero-Day Vulnerability is a security flaw unknown to the software vendor. Hackers exploit it before a fix is released, posing a significant risk.
A security token is a physical or digital device used to authenticate a user. Examples include hardware tokens, smart cards, or software tokens (like Google Authenticator).
A Honeypot is a decoy system designed to attract cyber attackers, allowing security professionals to study attack methods and improve defenses.
Network sniffing involves monitoring and capturing network packets to analyze data being transmitted over the network. Tools like Wireshark are commonly used.
BYOD (Bring Your Own Device) security involves securing personal devices used for work purposes to prevent unauthorized access and data breaches.
Endpoint security involves protecting end-user devices like computers, laptops, and mobile devices from cyber threats using tools like antivirus software, firewalls, and endpoint detection and response (EDR).
Cyber Threat Intelligence refers to gathering and analyzing data about potential or existing cyber threats to proactively defend against attacks.
A security breach occurs when unauthorized individuals gain access to secure systems, data, or networks, often leading to data leaks or damage.
A MitM attack occurs when an attacker intercepts and potentially alters communication between two parties without their knowledge.
Security policies are a set of rules and guidelines designed to protect organizational assets, ensure compliance, and minimize risks.
A security audit is an assessment of an organization’s information security infrastructure, policies, and practices to identify vulnerabilities and ensure compliance.
DLP is a strategy and technology used to prevent unauthorized access, sharing, or leakage of sensitive data, both in transit and at rest.
Cryptography is the practice of securing communication through encryption and decryption. It ensures confidentiality, integrity, and authentication of data.
A patch is a software update released to fix vulnerabilities, bugs, or improve security and functionality.
Botnets are networks of infected devices controlled remotely by cybercriminals to launch coordinated attacks, such as DDoS.
IAM manages and controls user identities and their access to systems, networks, and data, ensuring only authorized individuals have appropriate access.
The OWASP Top 10 is a list of the most critical web application security risks, including SQL Injection, Cross-Site Scripting (XSS), and Broken Authentication.
A VPN encrypts internet traffic and masks the user's IP address, ensuring secure communication and protecting against eavesdropping.
Steganography is the practice of hiding information within another file, such as embedding text within an image, for secure communication.
A Brute Force Attack involves systematically trying every possible password combination to gain unauthorized access.
Cross-Site Scripting (XSS) is a web security vulnerability that allows attackers to inject malicious scripts into trusted websites. It can steal user sessions, redirect users, or deface web pages. There are three main types: Stored XSS, Reflected XSS, and DOM-Based XSS.
CSRF is an attack where an authenticated user is tricked into performing an action they did not intend to, such as transferring funds or changing account settings. It typically happens via malicious links or forms.
Threat modeling identifies, prioritizes, and mitigates potential threats in a system. It involves analyzing security risks, vulnerabilities, and potential attack paths to ensure proactive security measures.
SIEM is a cybersecurity tool that collects, analyzes, and correlates security logs from different systems and applications to detect and respond to security threats in real-time.
The Cyber Kill Chain is a model developed by Lockheed Martin that describes the stages of a cyber attack:
Network segmentation divides a network into smaller sub-networks to reduce attack surfaces, improve performance, and contain potential breaches.
Security hardening involves securing systems by reducing vulnerabilities, disabling unnecessary services, updating software, and applying best security practices.
An insider threat refers to risks posed by employees, contractors, or trusted individuals who misuse their access to systems or data, either maliciously or accidentally.
EDR is a cybersecurity solution that continuously monitors and analyzes endpoint activities, detects malicious behavior, and provides threat response capabilities.
Patch management involves regularly updating software and systems to fix vulnerabilities, bugs, and improve functionality.
A security token is a hardware or software device used for authentication and secure access to systems.
DNS Spoofing is an attack where fake DNS records are inserted into a DNS resolver's cache, redirecting users to malicious websites.
Secure coding is the practice of writing code with security best practices to prevent vulnerabilities like SQL Injection and XSS.
Zero Trust assumes that no one, whether inside or outside the network, is trusted by default. Access is verified at every stage.
Digital forensics involves investigating cybercrime by collecting, analyzing, and preserving digital evidence for legal purposes.
A Security Policy Framework is a set of guidelines and procedures an organization follows to protect its systems and data.
Privilege escalation exploits vulnerabilities to gain elevated access to systems or data.
SET is an open-source penetration testing framework designed for social engineering attacks, like phishing or credential harvesting.
A rootkit is malicious software that hides its presence while granting attackers administrative-level control over a compromised system.
RBAC restricts system access based on user roles, minimizing unnecessary privileges.
In Two-Way SSL, both client and server authenticate each other's certificates to establish a secure connection.
ACL is a list of rules that control network traffic by permitting or denying access to resources.
A hash function converts input data into a fixed-size string, ensuring data integrity. Examples: SHA-256, MD5.
Key management involves generating, storing, and securely distributing encryption keys.
An air-gapped network is physically isolated from other networks, often used in highly sensitive environments.
An IRP is a documented plan outlining procedures for detecting, responding to, and recovering from security incidents.
A sandbox is an isolated testing environment used to analyze potentially malicious software without affecting the main system.
Social engineering awareness training educates employees about tactics used by attackers, such as phishing, pretexting, and baiting. Training helps individuals recognize and avoid falling victim to these schemes.
An APT is a prolonged and targeted cyberattack where an attacker gains unauthorized access to a network and remains undetected for an extended period to steal sensitive data or monitor activities.
Cybersecurity compliance ensures that an organization adheres to regulatory and industry-specific security standards, such as GDPR, HIPAA, or PCI DSS, to protect sensitive data.
A vulnerability assessment identifies, quantifies, and prioritizes security vulnerabilities in systems, networks, or applications to mitigate potential risks.
DNSSEC (Domain Name System Security Extensions) protects DNS data integrity and authentication by using cryptographic signatures, preventing DNS spoofing and cache poisoning.
An exploit kit is a software toolkit used by cybercriminals to exploit known vulnerabilities in software, often used for distributing malware.
A cybersecurity maturity model measures an organization's security readiness and improvement over time, often rated from basic to advanced security maturity levels.
Security awareness training educates employees about security risks, phishing attacks, password hygiene, and best practices to prevent cyber threats.
Key rotation involves regularly changing encryption keys to limit the exposure of data if a key is compromised.
Cyber insurance provides financial protection to organizations against losses from cyber incidents, including data breaches, ransomware attacks, and business interruption.
A digital certificate verifies the identity of an entity (e.g., a website or server) and enables secure communication through encryption.
NAC restricts unauthorized devices from accessing a network and ensures compliance with security policies before granting access.
Malware analysis is the process of examining malicious software to understand its behavior, origin, and impact to develop mitigation strategies.
A BCP outlines procedures to ensure critical business functions continue during and after a disaster or cybersecurity incident.
RBAC restricts access to resources based on the roles of individual users within an organization, minimizing unnecessary permissions.
Cybersecurity governance establishes policies, frameworks, and oversight to ensure security measures align with business goals and regulatory requirements.
Credential stuffing involves attackers using stolen usernames and passwords from one breach to gain unauthorized access to accounts on other platforms.
A cybersecurity risk assessment evaluates and identifies potential threats, vulnerabilities, and their impact on an organization’s assets.
Threat hunting is the proactive search for cyber threats within a network, using threat intelligence, analytics, and manual investigation techniques.