With high profile hacking attacks making news worldwide, keeping tabs on the latest cybersecurity trends is an important task for SMEs doing business over the Web – which, in this day
and age, is just about every company. To help you stay abreast of developments in the field, we’ve illustrated 10 of the most commonly used cybersecurity terms.
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
10 Cybersecurity Terms You Need To Know
1. With high profile hacking attacks making news
worldwide, keeping tabs on the latest cybersecurity
trends is an important task for SMEs doing
business over the Web – which, in this day
and age, is just about every company. To help
you stay abreast of developments in the field,
we’ve illustrated 10 of the most commonly used
cybersecurity terms.
10
CYBERSECURITY
TERMS YOU
NEED TO KNOW
2. Malware can refer
to a variety of
different types of
malicious programs,
including adware,
Trojans, spyware,
ransomware, and
more.
Keylogger software of
this type functions by
recording keystrokes
and internet
browsing data. This
is then transmitted to
a 3rd party who may
use it for nefarious
purposes.
Phishing occurs when
cyber criminals attempt
to fool people into
providing vital
information, such
as passwords and
account numbers, by
sending them emails
that appear to come
from a legitimate source.
01
03
05
02
04
Malware
Keylogger
Phishing
Trojan
Penetration
testing
Trojans are usually
distributed via emails,
or downloads. When
the software is
installed it provides
entry for malicious
actors who steal
your data or impede
the functioning of
your computer.
Penetration testing
involves engaging an
outside IT security
firm or a “white hat”
hacker to see if
they can gain entry
to your system. To
be performed on an
annual basis.
3. 333 Latimer Rd, London W10 6RA | 020 3031 9500
sales@bright.co
Anti-virus software
can protect your
system from known
threats. However, a
particularly nasty
form of malware
involves zero-day
exploits, or an exploit
which has not been
used previously.
Adware infections result
in the propagation
of unwanted
advertisements on
your computer. These
often consist of pop-
up ads that appear
over and over until the
software is removed.
A distributed denial of
service occurs when a
server is overwhelmed
with access requests
and becomes unable
to function properly.
Attacks of this type
are often used for
political purposes or
by hackers.
06
08
10
07
09
Zero-day
exploit
Adware
DDoS
Encryption
Social
Engineering
Data encryption makes
your data invulnerable
to being deciphered
by anyone without
the encryption key.
Be cautious when
sending sensitive
data that isn’t
encrypted over the
Internet.
Phishing is one form of
social engineering;
another is calling a
help desk or other
company resource
whilst pretending
to be someone
authorised to gain
access to valuable
information or resources.