Cyber Security Glossary
Advanced Persistent Threat / APT
Anomaly-based detection
Anomaly-based Intrusion Detection is a new technology that protects systems or networks against malicious and cyber-criminal activities using a heuristics-based detection, and less the classic signature-based methods. This detection type is still new and delivers a high number of False Positives. The problem is that a system must recognize abnormal activities and flag them as dangerous, but it is yet difficult to instruct a computer on what exactly a normal usage of the system is.
Anonymizing proxy
Anti-malware
Anti-spam
Anti-spoofing
Antispyware software
Antivirus software
Atmos
Attack (online)
Attack signature
Authentication
Autorun worm
Backdoor Trojan
Backup
Baseline security
Blackhat hacker
Blacklisting
Blended Threat
Boot sector malware
Bot
Botnet
Browser hijacking
Brute force attack
Buffer overflow
Bug
Bulk Encryption
Business Impact Analysis (BIA)
BYOD
Cache
Cache Cramming
Catfishing
Chief Information Officer (CIO)
CISO
Citadel
Code injection
Command and control center
Computer Abuse
Computer Forensics
Computer Incident Response Team (CIRT)
Confidentiality
Cookie
CoreBOT
Crimeware
Cross Site Scripting (XSS)
CryptoLocker
CryptoWall
CSO
Cyber Attack
Cyber incident
Cyber security
Cyber weapon
Dark Web
Data Asset
Data Integrity
Data leakage
Data loss
Data theft
Deep Web
Denial of service attack (DDoS)
Dridex
Drive-by attack
Due diligence
Dumpster diving
Eavesdropping Attack
Email malware distribution
Encrypted Network
Encryption
End-to-End Encryption
End-to-End Security
Enterprise Risk Management
Exploit
Exploit kit
Exploit kits-as-a-service
External Security Testing
Fail Safe
Fake antivirus malware
False positive
File binder
Fileless malware
Financial malware
Firewall
Flip button
Flooding
Forensic Specialist
Form-grabbing malware
Greyhat hacker
Hacker
Hacktivism
Heartbleed vulnerability
Hoax
Honeymonkey
Honeypot
HTTPS scanning
Hybrid attack
Identity Theft
Inadvertent Disclosure
Incremental Backups
Information Assurance (IA)
Information Flow Control
Information Security
Information Security Policy
Information Security Risk
Information System Resilience
Intellectual Property
Internal Security Testing
Internet worm
Intrusion
Intrusion Detection Systems (IDS)
IP Flood
IP Spoofing
J
Keylogging
Kovter
Level of Concern
Likelihood of Occurrence
Locky
Logic Bomb
Low Impact
Macro Virus
Malicious Applet
Malicious Code
Malvertisement
Malware
Malware-as-a-service
Man-in-the-middle Attack (MitM)
Maximum Tolerable Downtime
Mobile code
Mobile phone malware
Moderate Impact
Multifactor Authentication
Netiquette
Network Sniffing
Neutrino
Non-Repudiation
Nuclear Exploit Kit
Obfuscation
Offline Attack
Outside Threat
Packet Sniffer
Parasitic viruses
Passive attack
Password sniffing
Patch
Patch Management
Patching
Payload
Penetration
Penetration Testing
Polymorphic engine
Polymorphic malware
Polymorphic packer
Pop-up ad
Potential Impact
Potentially unwanted application (PUA)
Poweliks
Power virus
Proprietary Information (PROPIN)
Proxy server
Q
Ransomware
Real-time reaction
Remote access
Remote access Trojan / RAT
Remote diagnostics / maintenance
Replay attacks
Residual risk
Resilience
Risk assessment
Risk management
Risk mitigation
Rogue security software
Rogueware
Root cause analysis
Rootkit
Safeguards
Scareware
Scavenging
Security controls
Security impact analysis
Security requirements
Sensitive information
Shylock
Signature
Skimming
Sniffer
Social engineering
Spam
Spam filtering software
Spear phishing
Spillage
Spoofing (Email)
Spy-phishing
Spyware
SQL injection
SSL / Secure Sockets Layer
Stealware
Strong authentication
Supply chain attack
Suppression measure
Suspicious files and behavior
System administrator / Sysadmin
System integrity
Tampering
Targeted threat
Threat
Threat analysis
Threat assessment
Threat event
Threat monitoring
Threat scenario
Threat shifting
Threat source
Time bomb
Time-dependent password
Token
Tracking cookie
Traffic analysis
Traffic Encryption Key (TEK)
Trojan (Trojan horse)
Typhoid adware
Unauthorized access
Unauthorized disclosure
URL injection
Vaccine
Vawtrak / Neverquest
Virtual Private Network / VPN
Virus
Virus hoax
Vishing
Vulnerability
Wabbits
A wabbit is one of four main classes of malware, among viruses, worms and Trojan horses. It’s a form of computer program that repeatedly replicates on the local system. Wabbits can be programmed to have malicious side effects. A fork bomb is an example of a wabbit: it’s a form of DoS attack against a computer that uses the fork function. A fork bomb quickly creats a large number of procceses, eventually crashing the system. Wabbits don’t attempt to spread to other computers across network.
Watering Hole
Web bug
Web content filtering software
Webattacker
Whitehat hacker
Also known as ethical hackers, these are usually cybersecurity specialists, researchers or just skilled techies who find security vulnerabilities for companies and then notify them to issue a fix. Unlike blackhat hackers, they do not use the vulnerabilities except for demonstration purposes. Companies often hire whitehat hackers to test their security systems (known as “penetration testing”). As their expertise has grown to be more in demand and sought after, whitehat hackers started to collect rewards for their work, ranging from 500$ all the way to 100,000$.
Whitelist
A whitelist is a list of email addresses or IP addresses that are considered to be spam-free. It’s the opposite of a blacklist, which usually includes a list of blocked users. Spam filters have both whitelists and blacklists of senders, and also keywords to look for in emails, which enable them to help detect a spam email.
Worm
X
Y
Zero Day
A Zero Day or Zero Hour attack are attacks that use vulnerabilities in computer software that cyber criminals have discovered and software makers have not patched (because they weren’t aware that those vulnerabilities exist). These are often exploited by cyber attackers before the software or security companies become aware of them. Sometimes, Zero Days are discovered by security vendors or researchers and kept private until the company patches the vulnerabilities.
Zero Day virus / malware
Zero-Day attack
A Zero Day (or Zero Hour or Day Zero) attack or threat is a computer threat that tries to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer. Zero Day exploits (actual code that can use a security hole to carry out an attack) are used or shared by attackers before the software developer finds out about the vulnerability
Zeus GameOver / Zeus P2P
Zeus GameOver is a variant of the ZeuS/Zbot family – the infamous financial stealing malware – which relied on a peer-to-peer botnet infrastructure to work. Zeus GameOver was used by cyber criminals to collect financial information (credentials, credit card numbers, passwords, etc.) and any other personal information which could be used to access the victim’s online banking accounts. GameOver Zeus is estimated to have infected 1 million users around the world and it was taken down in mid-2014 through Operation Tovar
Zip bomb
A Zip Bomb, also known as Zip of Death or Decompression Bomb, is a malicious archive file. When uncompressed, it expands dangerously, requiring large amounts of time, disk space and memory, causing the system to crash. Usually it’s a small file, only up to a few hundred kylobytes, in the form of a loop, which will continuosly unpack itself until all system resources are exhausted. It’s designed in order to disable the antivirus software, so that a more traditional virus sent afterwards could get into the system wihtout being detected