【 Glossary of Cybersecurity Terms 】 Alphabetical Order ▷ 2022

Cybersecurity is one of the areas that allows us to preserve our system through security and protection strategies. But before knowing the practical it is always better to know everything theoretical.

if you want to become in an expert on the subject, then you should consider yourself lucky, because you have reached the best place. Here, We are going to explain the importance of knowing substantial conceptswhich will allow you to develop in the world of digital security.

On the other hand, we will show you a list of the most common termsordered from the first letter of the alphabet (“A”) to the last (“Z”).

Why is it important to know the essential terms of cybersecurity?

Knowing the most frequent terms in the world of cybersecurity allows us to be more vigilant of attacks and know how to prevent them. In other words, we cannot go to war without knowing how to use weapons.
It is incorrect to think that security strategies can be generated without first knowing at least the concept of each of the most frequent termsnot only because it would take more time to find a patch or solution, but also because we can generate ineffective strategies against the existing vulnerability and threat.

The cybersecurity concepts that you should know in alphabetical order

Now that you understand the importance of knowing the essential terms of cybersecurity, Let’s start with the glossary alphabeticallystarting from the first letter of the alphabet, which is “A”:

A

information asset

information assetsare all the computer resources that a company uses for its management, including the physical (hardware) and programmable (software) parts. Enables effective communication between all components, in turn strengthening the security of the system.

License agreement

license agreements, are sessions established for the purpose of requesting rights or permissions to make use of any specific content or technology. This interaction takes place between creator and applicant.
In most license agreements there are conventions, which allow the owner benefit from granting your rights to someone else.
Three types of license agreements can be found, such as:

  • Technology license, trademark franchise and copyright license agreements
  • Electronic Administration

It is an activity that lies the provision of services to both public and private entities, through telematic resources, defined in Law 11/2007 of June 22 on Electronic Access.
The objective of e-Government is to create simple processesthat allow the maintenance and management of resources, through the strengthening of legal certainty. The main objectives of this activity are:

  • Promote the use of new technologies for communication and information.
  • Create transparency and trust between citizens and companies.
  • Promote the evolution of the information society.
See also  【 TURN OFF the Screen in Windows 10 】▷ Step by Step Guide ▷ 2022

adware

Also known as malvertisingis adware, which displays ads automatically during the installation of a programgenerating lucrative benefits to the creator.
The behavior of this program is associated with malware, however, this term cannot be fully used, because it is not intended for the extraction of information from people.

security hole

A security hole aka vulnerabilityis the error generated from the center of the system, whose breach can lead to the theft of computer files and data, completely destroying system security.

encryption algorithms

It’s an operation used for the purpose of protecting a text or fileapplying symbols, codes, and numbers, thus guaranteeing the confidentiality of the stored information.
exist two types of encryption algorithmsknown as symmetric and asymmetric encryption:

  • symmetric encryption It is the most widely used method to protect information. In this type, only one key is used to encrypt and decrypt the content.
  • Secondly, asymmetric encryption makes use of two encodings, one used for encryption and one used for decryption of information. Guaranteeing greater confidentiality in the stored content.

Threat

Threats are situations where the system is attacked by malicious softwareor failures caused naturally, intentionally or accidentally compromising all assets, causing a collapse in its operation.

anti virus

Are computer programs that perform countermeasures eliminating threats and infections in the system. The objective of an antivirus is to eradicate all malicious code responsible for altering and extracting information.
Because antimalware detect the presence of malware through your code, the first ones must contain an extensive up-to-date databaseso that future damage to the system is avoided.

Risk analysis

Is the process which consists of the search and analysis of threats and vulnerabilities within a system. Its objective consists of identifyingand generate corresponding activities to address the risk encountered.
This activity is usually very important at the time of eliminate threats without generating large asset losses.

dictionary attack

It’s the cracking method used to crack passwords, using the dictionary. This attack is very common because many of the users make use of existing words in the dictionary as passwords for easy memorization.
A dictionary attack is many times more efficient than any brute force attack, however, this does not guarantee that it will be effective on all occasions..

See also  【 Make Triptych in Word 】 Step by Step Guide ▷ 2022

brute force attack

brute force attacks, consist of generating combinations randomly until you can decipher some encryption. This method is usually slow, since it is a trial and error test.
Unlike the dictionary attack, this uses words and combinations inside and outside the dictionary. It is not always very efficient, but thanks to this attack, the extraction of major assets in large systems.

combo attack

This is one of the more aggressive cyber attacksbecause it combines different infection techniquesincluding computer viruses such as worms, Trojan horses and malicious code.
Its attack is a rapid infection, spreading rapidly through files and algorithmic structures, restructuring codes and causing serious damage. It does not need human intervention for propagation, because his self execution allows him to act intelligently.

replay attack

This attack is characterized by capturing the information that travels through a network, before it reaches the set point. The kidnapping is carried out in a meticulous way, so that the recipient did not notice no irregular situation.
If the infected system maintains the vulnerability with this type of attack, cooperate with the attacker sending you valuable coding information and commands as if you were a legitimate user.

security audit

It is a job done by professionals, whose objective is to manage and organize all the information received due to verified vulnerabilities and possible threats. This activity can be exhaustivebut it is the most important in cybersecurity.

Authentication

It is the process that is responsible for identifying users accessing a system or computer. Its work is in conjunction with the encryption of documents or applications, and is characterized for offering secure communication between the different points of connectionbe they computer-person, or person-computer.

Authenticity

authenticity It is the process where a user is allowed, by means of a previous identificationaccess to all resources found on a system, network, or set of computers.
In this process logged in users are identifiedin turn checking the permissions granted for your profile.

certification authority

It is the trusted entity and with the permissions enough to define profiles, and guarantee correct identification, through digital authorization. Each user is assigned or revoked the necessary accesses for control or activity within a system.

registration authority

is the action responsible for identifying and selecting users before granting the digital certificates. In other words, it is the only local authority that allows and manage records.

validation authority

It is the service provider that is in charge of approving the certifications, ensuring the authenticity, validity and transparency of all transactions carried out, including the most critical ones. The validation authority works together with digital certificates, to guarantee an integral management, in exchange processes and information movements.

See also  【Take Screenshots in Windows】Step by Step Guide ▷ 2022

Legal warning

It is a document that is generated with the purpose of informing to people about the conditions, permissions and regulations of the use of an application or service. In the legal notices include privacy policiesarticles of the law and information on cookies and their uses.

B.

B2B

B2B is the acronym for Business to Businessreferring to all transactions that are carried out at a commercial level between companies and companies. It is based on the telematic medium EDI or electronic commerce.
Its use attracts advantages to companies, in a way that offers speed and security in communicationsintegrating all the computing resources that exist within a company.

B2C

The term Business to Consumer It refers to the information technology strategy used to strengthen commerce between the consumer and companies. There are indicated all the transactions carried out, directly, without the need for the presence of third parties.

back door

back door or back door According to its translation, it refers to a sequence of terms present in the programming codes, with which the identification and security of a system can be bypassed.

Backup

That term refers to backups that are made to a group of files, or contents stored within a system. The objective of creating a Backup is to safeguard the information in case that there are attacksor damage to the behavior of the computer.
The devices that are used to back up files are; hard, optical, and external drives (USB and DVD), One of the most widely used methods today is the backup in cloud services.

BIA

BIA is the abbreviation for Business Impact Analysis. This is a report that indicates the costs generated by each interruption of critical processes, allowing us to assign and define the objectives to recover each of them, approving a stability in the system.

bluetooth

Bluetooth is the technology implemented for the transmission of electronic files, through the wireless connection of two or more devices. This file sharing method looks for…

Loading Facebook Comments ...
Loading Disqus Comments ...