cybersecurity words

Cybersecurity Words/Terminologies You Should Know

Cyber Security

It’s important to know cybersecurity words or terminologies, especially because these are the words you’ll often encounter in the field. So, here are a few common cybersecurity words/terminologies that everyone should know.


It is a technology that lets us enter our files and/or services through the internet. Yes, you can access them from all corners of the globe. In other words, it’s a compilation of computers with large storage capacities that remotely attend requests.


A set of programs that command a computer to do a task. Then, the instructions are embedded into a package that users can install and use. One example of application software is Microsoft Office.


A group of devices, printers, and computers that are linked to each other and administered as a whole. For instance, your computer is normally part of a domain at your workplace.

Ads by CISO-Portal

Virtual Private Network (VPN)

It is a tool that can help you massively when browsing the Internet. Yes, it is a tool that lets the user remain unknown while using the internet. How? By concealing the location and encrypting traffic.

IP Address

It’s like your home address, but an internet version for your computer. Moreover, your IP address is usually identified when it interacts over a network.


A spiteful application or script that takes advantage of a computer’s vulnerability. People with bad intentions can use this to their advantage.


Speaking of bad intentions, a breach is caused by it. When a hacker gets into the system and has done damage to its files and network, it’s called a breach. Yes, a successful exploit of a device’s vulnerability.


It’s a defense mechanism that protects you from the bad guys. Also, it’s like a gate between you and the network. Moreover, firewalls can be hardware or software-based.

Malware “the bad guy”

Speaking of “bad guys”, malware is the ultimate enemy for cybersecurity. It is an umbrella term that defines all forms of wicked software. Yes, it’s solely built to wreak havoc on a computer.


An example of malware is a virus. It is a type of malware that corrupts, erases, or modifies information on a computer before expanding to others.


It is another form of malware. It restricts you from reaching files on your computer – holding your data hostage. As the name suggests, it requests that a ransom should be paid to have them decrypted.

Trojan Horse

It allows a hacker to obtain exclusive access to a computer through a “back door”. Also, it is a form of malware.


A piece of malware that can replicate itself to expand the infection to other connected computers.


A type of software application or script that executes tasks on command. By doing so, it lets attackers exclusively take control of an affected computer. Also, “botnet” is called to a collection of these infected computers.


As the name suggests, it is a type of malware that works by spying on user activity without their knowledge. The capabilities of this threat can lead to major damages.

Our Score

Ads by CISO-Portal

Leave a Reply

Your email address will not be published. Required fields are marked *