Cyber Security Vocabulary
Cybersecurity is the activity or process, ability or capability, or state where information and communication systems and the information contained there are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
There are some computer security terms that are common but there are some which are mysterious to those encountering them for the first time.
These are some basic cybersecurity terms that are used during cybersecurity trends.
These are the programs that protect the devices from internet viruses or codes that can disable the functioning of the devices. In today’s time, nearly all computer sold today provides access to these type of software. When functioning properly with all necessary updates, this software will constantly monitor the computer to prevent viruses from “infecting” it.
While maintaining security controls in computers there can be active and passive attacks. During an active attack, the attacker tries to alter a system’s data, resources, and operations, and a passive attack simply involves trying to access and use a computer system’s information –without trying to alter its resources, operations, or data.
It is a method in which software or hardware tries to circumvent computer security. It is also called trap door.
In this case the hacker or the attacker who approached the computer network with the help of threats will try to maximize the damage by using multiple types of viruses and worms. For example, an attacker might try to send out an e-mail virus with a Trojan horse embedded in an HTML file. Past examples of blended threats include both Bugbear and CodeRed;
The technique to attack a computer with a bot – or remote control agent – bypassing the firewall and antivirus software. Once it is installed in the computer, a bot becomes part of a bot network (botnet) that the hacker or bot owner/bot herder can then manipulate. Bots can install various types of spyware on the computer, allowing the bot owner to take it over whenever it is connected to the Internet. Some people use the term “zombie” interchangeably with the term “bot;”
In this technique an event is planned in which an organization simulates cyber disruption so that it can test multiple capabilities such as prevention, detection, mitigation, and response or recovery from the disruption.
It is the process of translating plaintext into ciphertext. The plaintext is the unencrypted data whereas cyphertext is the encrypted data.
It is the capability to limit network traffic between networks and/or information systems. It is the hardware/software device or a program that limits network traffic with a set of rules for what accessed and not allowed or authorized.
This is simply a bridge between two computer networks;
Subscribe to our Youtube ChannelSubscribe