This page containes the terms I believe are important for the field of Cyber Security.
Cloud Computing - "The on-demand availability of computer systems resources, especially data storage and computing power, without direct active management by the user." (Cloud Computing, 2019)
Software - “the programs and other operating information used by a computer.” (Software, n.d.)
Domain - “contains a group of computers that can be accessed and administered with a common set of rules.” (Domain, n.d.)
Virtual Private Network (VPN) – “enables authorized users to send and receive data and to access networked resources as if they were directly plugged into private network servers.” (Woodbury, 2018)
IP Address – “is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.” (IP Address, 2019)
Exploit (Computer Security) – “is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).” (Exploit, 2019)
Data Breach – “is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.” (Data Breach, 2019)
Firewall – “a piece of computer software or hardware that is designed to monitor connections between computer networks to provide protection from malicious software or attacks from hackers.” (Lasky, 2018)
Malware – “any program installed on a computer that performs harmful actions” (Biscontini, 2018)
Ransomware – A type of Malware, “is software that intentionally holds a user’s personal information hostage by heavily encrypting all personal or important files on an infected machine.” (Biscontini, 2018)
Virus – A type of Malware, “it specifically refers to any type of self-replicating program designed to interfere with a user’s activities on a computer.” (Biscontini, 2018)
Trojan Horse – A type of Malware, “are a type of malware that masquerades as another program.” (Biscontini, 2018)
Worm – A type of Malware, “are self-replicating computer programs that distribute malicious code across networks.” (Biscontini, 2018)
Rootkit – A type of Malware, “designed to remain undetected by traditional antivirus tools.” (Biscontini, 2018)
Bot/Botnet – “aconnected computers performing a number of repetitive tasks to keep websites going.” (What Is A Botnet?, n.d.)
Denial-of-service attack (DDoS) – “is an Internet-based attack in which the perpetrator deliberately overloads an individual’s or organization’s web servers by repeatedly accessing them, typically using an automated program.” (Crelin,2018)
Phishing/ Spear Phishing – “The act of using various communication devices such as e-mail and telephones in an attempt to trick individuals into either revealing their personal information, including passwords and social security numbers, or installing malicious software (malware)” (Cooper, 2018)
Social Engineering – “Social engineering, sometimes referred to as humanhacking,refers to the art and technique of convincing people to release confidential information or engage in a course of action they may not necessarily choose for themselves.” (MA, 2019)
Penetration Testing –“is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.” (What is pen test (penetration testing)?, n.d.)