Cybersecurity buzz words definitions

Encryption Key

Let us learn the definition of some cybersecurity terms

Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes with the user’s computer security and privacy. There are different types of malware such as:

Computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be “infected” with a computer virus, a metaphor derived from biological viruses. Computer viruses generally require a host program. The virus writes its own code into the host program. When the program runs, the written virus program is executed first, causing infection and damage.

Worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behavior will continue.

Trojan is a malware that misleads users of its true intent. Trojans can come in many different varieties, but generally they do the following: Download and install other malware, use infected device for click fraud, record keystrokes and websites visited, send information about the infected device to a malicious hacker including passwords, login details for websites, and browsing history and give a malicious hacker control over the infected device.

Spyware is a type of malicious software that is installed on your computer or mobile device without your consent. It can gain access to your sensitive personal information and then relay it to other parties.

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keystroke recorder or keylogger can be either software or hardware.

Adware or advertising supported software, is software that displays unwanted advertisements on your computer. Adware programs will tend to serve you pop-up ads, can change your browser’s homepage, add spyware and just bombard your device with advertisements.

Ransomware is malware that encrypts your files or stops you from using your computer until you pay money (a ransom) for them to be unlocked.

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually performed through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing methods include:

SMS phishing, or Smishing, is a mobile phishing attack that targets victims via SMS messaging to trick the targeted recipients into clicking a link and sending the attacker private information or downloading malicious programs.

Vishing is a is a phone-based phishing scam aimed at stealing personal information over the phone using a combination of voice and phishing. Criminals are usually after personal or financial information they can use to exploit you.

Whaling is a type of phishing attack used by cyber criminals to masquerade as a senior executive at an organization and directly target senior executives likely to have access to confidential information, with the aim of stealing money or sensitive information or gaining access to their computer systems for criminal purposes.

Denial of service (DoS) attacks is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.

Distributed Denial of Service (DDoS) is an attack in which many compromised systems are made to attack a single target, in order to swamp server resources and block legitimate users.

Man In The Middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between two targets, either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution, allowing an attacker to query the database, view and modify the data that they are not normally allowed.

Leave a Comment