Term or Phrase
|
Definition
|
Threat |
A potential cause of an unwanted incident, which may result in harm to a system or organisation. |
Vulnerability |
A weakness in a system that can be exploited by a threat to cause harm or loss. |
Risk |
The potential for loss or damage when a threat exploits a vulnerability. |
Exploit |
A method or code that takes advantage of a vulnerability in a system. |
Attack |
An intentional act to harm or gain unauthorised access to systems. |
Mitigation |
Steps taken to reduce the severity or likelihood of a threat or vulnerability. |
Patch |
A fix or update to software that closes a vulnerability or bug. |
Incident |
An event that may indicate a breach or failure in security measures. |
Remediation |
Actions taken to fix or resolve a security issue after an incident. |
Asset |
Something valuable (like data, systems, or networks) that needs protection. |
Phishing |
A fraudulent email meant to trick users into revealing sensitive information. |
Spear Phishing |
A targeted phishing attack aimed at a specific individual or organization. |
Whaling |
A phishing attack aimed at high-level executives or key personnel. |
Smishing |
A phishing attack sent via text messages. |
Vishing |
A phishing scam conducted over the phone. |
Malware |
Malicious software designed to damage, disrupt, or gain access to a computer system. |
Ransomware |
Malware that encrypts a victim’s data and demands payment for the decryption key. |
Spyware |
Software that secretly gathers user information without their consent. |
Adware |
Unwanted software designed to throw ads at users, often intrusive. |
Trojan Horse |
Malicious software disguised as legitimate software. |
Worm |
A type of malware that spreads itself across networks. |
Keylogger |
Software that records keystrokes to steal sensitive data. |
Botnet |
A network of infected computers controlled remotely by an attacker. |
Man-in-the-Middle (MitM) |
An attack where the attacker secretly intercepts and possibly alters communication. |
Denial-of-Service (DoS) |
An attack that makes a system or service unavailable by overwhelming it with traffic. |
Distributed Denial-of-Service (DDoS) |
A coordinated DoS attack launched from multiple computers. |
Zero-Day |
A previously unknown vulnerability that is exploited before a fix is available. |
SQL Injection |
An attack that inserts malicious SQL code into a query to access data. |
Cross-Site Scripting (XSS) |
An attack where hackers inject scripts into webpages viewed by others. |
Brute Force Attack |
An attempt to crack passwords by trying many combinations rapidly. |
Multi-Factor Authentication (MFA) |
An authentication method requiring more than information than just a password. Often involves something you have such as phone to receive SMS messages or a key fob. |
Two-Factor Authentication (2FA) |
A type of MFA using two distinct forms of identity verification. |
Password Manager |
Software that helps create and store strong, unique passwords. |
Single Sign-On (SSO) |
A login system that lets users access multiple applications with one set of credentials. |
Access Control |
Rules and systems that determine who can access what resources. |
Role-Based Access Control (RBAC) |
An access control system based on a user’s role in an organisation. |
Least Privilege |
Granting users only the access they need to perform their job duties. |
Privileged Access Management (PAM) |
Tools and policies to control and monitor access by high-privilege users. |
Firewall |
A security device or program that monitors and filters incoming/outgoing network traffic. |
Intrusion Detection System (IDS) |
A tool that monitors network traffic for suspicious activity or policy violations. |
Intrusion Prevention System (IPS) |
A system that detects and blocks potential threats in real time. |
Virtual Private Network (VPN) |
A secure connection over the internet that hides a user’s data and location. |
Proxy |
A server that acts as a go-between for a user and the internet. |
Port Scanning |
Scanning a system for open ports to identify possible vulnerabilities. |
IP Address Spoofing |
Faking an IP address to disguise the source of network traffic. |
MAC Address |
A hardware address that uniquely identifies a device on a network. |
Network Segmentation |
Dividing a network into segments to contain and limit threats. |
Encryption |
The process of converting data into a secure format to prevent unauthorised access. |
Decryption |
The process of converting encrypted data back into its original form. |
Hashing |
A way to convert data into a fixed-length string to verify its integrity. |
Data Breach |
An incident where sensitive or confidential data is accessed or disclosed without authorisation. |
Personally Identifiable Information (PII) |
Information that can be used to identify an individual. |
Personal Data |
Any information that can be used to directly or indirectly identify a person. |
Special Category Data |
A specific type of personal data that is more sensitive and requires extra protection. |
Data Loss Prevention (DLP) |
Tools and strategies used to prevent unauthorised sharing or access to data. |
Tokenisation |
Replacing sensitive data with non-sensitive placeholders. |
Anonymisation |
The process of removing personal identifiers from data to protect privacy. |
SIEM (Security Information and Event Management) |
Software that aggregates and analyses security data in real time for threat detection. Allows cyber personnel to monitor, alert and act on threats. |
EDR (Endpoint Detection and Response) |
A tool that detects and responds to threats on individual devices. |
XDR (Extended Detection and Response) |
An advanced security system combining data across multiple security layers. |
SOC (Security Operations Centre) |
A team or facility that monitors and responds to security incidents. |
Penetration Testing (Pen Test) |
Simulated attacks to test an organisation’s security defences. |
Vulnerability Scanner |
Software that scans systems for known vulnerabilities. |
Red Team |
Security experts who simulate attacks to test defences. |
Blue Team |
Security professionals who defend systems from attacks. |
Purple Team |
Teams that blend offensive and defensive security roles. |
Bug Bounty |
Programs that pay individuals for finding and reporting bugs. |
Threat Intelligence |
Information about potential or existing threats used to improve security. |
Security Posture |
An organisation’s overall cybersecurity health and readiness. |
Log Analysis |
Reviewing system logs to detect unusual or suspicious behaviour. |
GDPR (General Data Protection Regulation) |
A law regulating data privacy and protection in the EU. |
HIPAA (Health Insurance Portability and Accountability Act) |
A U.S. law that protects health data privacy and security. |
PCI-DSS (Payment Card Industry Data Security Standard) |
Security standards for companies that process credit card information. |
ISO 27001 |
An international standard for managing information security. |
NIST (National Institute of Standards and Technology) |
A U.S. agency providing cybersecurity frameworks and guidance. |
SOC 2 |
An audit standard used to confirm information security practices align with the U.S. AICPA criteria. |
Audit Trail |
A record showing who accessed or modified data and when. |
Governance |
Oversight and control mechanisms for managing security policies and processes. |
Policy |
A set of rules and guidelines used to protect its digital systems, data, and users. |
Security Awareness Training |
Training programs to help employees understand and practice good security habits. |
Alert Fatigue |
Overwhelm from too many security alerts, making real threats hard to spot. |
False Positive |
A harmless activity wrongly flagged as malicious. |
Indicators of Compromise (IOC) |
Signs that a system has been compromised. |
Indicators of Attack (IOA) |
Signs that an attack is currently happening or in progress. |
Kill Chain |
The stages of a cyberattack from planning to execution. |
MITRE ATT&CK Framework |
A knowledge base of adversary tactics and techniques. |
Playbook (Incident Response) |
A documented procedure for handling specific security incidents. |
Containment |
Containing a security breach to stop it from spreading. |
Eradication |
Removing the root cause of a security incident. |
Recovery |
Restoring systems and data to normal after an incident. |
Social Engineering |
Tricking people into giving up confidential information through manipulation. |
Security Hygiene |
Basic steps and practices to maintain good digital security. |
Security by Design |
Building systems with security in mind from the start. |
Shadow IT |
Unauthorised use of applications or devices within an organisation. |
Insider Threat |
A threat that originates from someone inside the organisation. |
Attack Surface |
The total set of points where an attacker can try to enter a system. |
Security Culture |
The values and behaviours that prioritise and support cybersecurity within an organisation. |
Risk Appetite |
The level of risk an organisation is willing to tolerate. |
Defence in Depth |
Using multiple layers of defence to protect information systems. |
Zero Trust |
A security model that assumes no user or system is trustworthy by default. |
Threat Modelling |
A process of identifying and assessing potential threats and vulnerabilities. |
Security Baseline |
A minimum set of security settings and practices all systems must follow. |