This document defines several key cyber security terms: CAPTCHA uses distorted text to distinguish humans from machines; a cyber attack assaults computers or networks through hacking; cyber threats are malicious attempts to steal data or access files; an exploit takes advantage of a vulnerability; vulnerability is a weakness that can be exploited; mitigation lessens damage from attacks; a patch fixes security flaws; data breach discloses private information without authorization; authentication verifies a user's identity; two-factor authentication uses two methods like a password and token; and multi-factor authentication uses multiple independent factors for access.