Cybersecurity Glossary

:blue_book: Cybersecurity Glossary – Learn the Language of Cyber

Welcome to our glossary of cybersecurity terms! This thread is here to help everyone—from total beginners to seasoned pros—understand key cybersecurity concepts. If you ever get stuck on a term in one of our posts, this is your go-to resource.

:light_bulb: Pro tip: Suggest new terms in the comments and we’ll add them!


:brain: Cybersecurity Terms (A–Z)

Term Meaning
Access Control A method that determines who can access or use systems and resources.
Adware Unwanted software that displays ads on your device, often installed without your consent.
Advanced Persistent Threat (APT) A long-term, targeted cyberattack where hackers secretly stay inside a system.
Antivirus Software that detects and removes malicious programs like viruses or worms.
Authentication Proving who you are—like entering a password or scanning a fingerprint.
Authorization Giving approved users permission to access specific files or actions.
Backdoor A hidden way into a system, often installed by hackers or poorly secured apps.
Black Hat A hacker with malicious intent. The opposite of a “white hat” who hacks ethically.
Bot Software that automates tasks, sometimes helpful (like chatbots), sometimes harmful.
Botnet A group of infected devices controlled by hackers to perform attacks.
Brute Force Attack Repeatedly trying all possible password combinations to guess the correct one.
Bug A software error or flaw that causes unexpected behavior.
Business Continuity A plan to keep a business running even during a cyberattack or disaster.
Certificate Authority (CA) A trusted group that issues digital certificates to prove website legitimacy.
Cyber Espionage Stealing sensitive information through cyber means, usually by nation-states.
Cybersecurity Protecting systems, networks, and data from digital threats.
Data Breach When sensitive data is accessed, leaked, or stolen without permission.
Data Encryption Turning data into unreadable code to protect it from unauthorized access.
Denial of Service (DoS) Overloading a website or system so real users can’t access it.
Digital Certificate Proof that a website or file is legitimate and safe to interact with.
Digital Signature A secure, verified way of signing documents electronically.
Domain Name System (DNS) The system that turns website names (like google.com) into IP addresses.
Email Header The behind-the-scenes information in an email showing where it came from.
Encryption Scrambling data so only someone with the right key can read it.
Firewall A security barrier that filters good vs. bad traffic on a network.
Hacker Someone skilled in computer systems—may be ethical (white hat) or malicious (black hat).
Hybrid Analysis A sandbox tool where you can safely test if a file or link is malicious.
Identity Theft When someone uses your personal info to impersonate you or commit fraud.
Incident Response (IR) How a team investigates and recovers from a cyberattack.
Intrusion Detection System (IDS) Monitors network traffic for signs of an attack.
Intrusion Prevention System (IPS) Similar to an IDS, but it can block attacks in real-time.
Keylogger Malicious software that records everything you type—like passwords or messages.
Malware Any software designed to harm or exploit a computer system.
Multi-Factor Authentication (MFA) Using two or more ways to verify your identity (e.g., password + phone).
Network Security Protecting the infrastructure that connects devices to the internet.
Password Cracking Guessing or extracting passwords to break into systems.
Patch A software update that fixes bugs or security issues.
Phishing Fake emails or texts that try to trick you into giving up sensitive info.
Prometei Botnet A malware network that steals data and spreads across systems.
Ransomware Malware that locks your files and demands money to unlock them.
Rootkit Malicious tools that hide deep inside a system and give hackers control.
Sandbox A secure testing space where suspicious files or code can be opened safely.
Secure Socket Layer (SSL) An old protocol for secure website connections—now replaced by TLS.
Security Policy A company’s rules and guidelines for staying secure online.
Social Engineering Tricking people into revealing information or clicking malicious links.
Spam Unwanted emails, often trying to sell you something or trick you.
Spyware Software that secretly collects information from your device.
Trojan Horse Malware that pretends to be something safe—like a fake app or update.
TryHackMe An online platform with labs and challenges to learn cybersecurity.
Two-Factor Authentication (2FA) A login process using two methods to confirm identity (e.g., password + code).
Virtual Private Network (VPN) A tool that encrypts your internet connection and hides your location.
Virus A type of malware that spreads and damages systems or files.
Vulnerability A weakness in a system that attackers can exploit.
Whitelist A list of approved items that are allowed through security filters.
Wireshark A tool for analyzing network traffic to find suspicious activity.
Worm Malware that spreads on its own across networks.
Zero Day A newly discovered flaw that has no fix yet — often targeted by attackers.

:speech_balloon: Want to add a term? Drop a comment below with your suggestion and we’ll review it!

:compass: Linked from weekly updates: We’ll link to this glossary from our learning threads any time we introduce a new term.