Glossary
Access Controls:
Measures to restrict who can access certain information and systems.
Antivirus Software:
A programme that detects and removes malicious software from your computer and devices.
Authentication:
The process of verifying a user's identity before granting access.
Backup:
A copy of your data stored separately to restore in case of data loss.
Botnet:
A network of infected computers controlled by a hacker.
Brute Force Attack:
A method of cracking passwords by trying many combinations until the correct one is found.
Cloud Security:
Measures to protect data and applications stored in cloud services.
Compliance:
Ensuring that your cybersecurity measures meet industry standards and legal requirements.
Cryptocurrency:
Digital currency that uses encryption for security.
Cybersecurity Posture:
The overall strength and effectiveness of an organisation's cybersecurity measures to protect against cyber threats.
Data Breach:
An incident where sensitive information is accessed without authorisation.
Data Encryption:
Converting data into a secure format that can only be read with a key.
Denial of Service (DoS):
An attack that overloads a system to make it unavailable to users.
Endpoint Security:
Protecting all devices connected to your network, like a computer, tablet or smartphone.
Firewall:
A security system that controls incoming and outgoing network traffic based on predetermined security rules.
Hacker:
Someone who gains unauthorised access to computer systems.
Incident Response Plan:
A plan for dealing with cybersecurity breaches and minimising damage.
Incident Response:
The process of handling and recovering from a cybersecurity breach.
Insider Threat:
A security risk that originates from within the organisation.
Malware:
Malicious software designed to harm or exploit any programmable device.
Multi-Factor Authentication (MFA):
A security system that requires more than one method of authentication to verify a user's identity before granting access.
Network Monitoring:
Continuously observing your network for unusual activity that could indicate a security threat.
Patch:
A software update that fixes vulnerabilities and improves security.
Penetration Test (Pentest):
A simulated cyber attack to identify and fix security weaknesses.
Phishing:
A scam where attackers trick you into providing personal information by pretending to be a trusted entity.
Ransomware:
Malware that locks your data and demands payment to unlock it.
Risk Assessment:
Evaluating potential threats and vulnerabilities to understand the level of risk to your organisation.
Security Audit:
A review of your cybersecurity measures to ensure they are effective and up to date.
Social Engineering:
Manipulating people into revealing confidential information.
Spam:
Unsolicited and often irrelevant or inappropriate messages sent over the internet.
Spyware:
Software that secretly monitors and collects information about you.
Threat Detection:
Identifying and responding to potential cyber threats in real-time.
Trojan Horse:
A type of malware that disguises itself as a legitimate program.
Virus:
Malware that replicates itself and spreads to other computers.
Vulnerability:
A weakness in a system that can be exploited by cyber threats.
VPN (Virtual Private Network):
A service that encrypts your internet connection to ensure privacy and security.
Worm:
A type of malware that spreads copies of itself from computer to computer.