Cybersecurity Terminology Defined - feature

Cybersecurity Terminology, Defined

In the age of mass password hacks, account breaches, and the growing network of things connected to the Internet, there are a lot of phrases being tossed around online. The help you understand what exactly any of it means, read our definitions of common cybersecurity terminology below…

Common Cybersecurity Terminology

  1. Malware: Code that can be used to attack a computer via a virus, such as a Trojan virus, ransomware, spyware, or malvertising. This can result in data theft, file corruption, compromised privacy, and more.
  2. Phishing: A fake email tactic used to lure victims into divulging sensitive information, such as account details, passwords, login credentials, or personal information such as a mailing address. This is similar to Spoofing, in which an email is sent that appears to be from a legitimate source such as your banking institution or your music streaming service.
  3. Spam: Not to be confused with Phising, spam is essentially unsolicited email or messages. A major security concern with spam messages is that they can often contain malware, or on the more benign spectrum simply subscribe users to content they did not want to receive such as newsletters or coupons.
  4. Machine Learning: An emerging technology in artificial intelligence that allows machines (read: robots, chatbots, algorithms, et cetera) to “learn”. What’s important for online security and AI is that special rules and parameters must be established to ensure the privacy and security of anyone interacting with technology equipped with machine learning.
  5. IoT: The acronym for the “Internet of Things” is used to describe all items that are, or can be, connected to the Internet. From your smart home thermostat to your programmable Crock Pot, there are a growing number of devices that fall under the IoT. Anything connected to the Internet is in turn vulnerable to being hacked.

Related Read: Are You Falling for Fake News, Still? 

Do you have other cybersecurity terminology that you’d like defined? Let us know in the comments section below!

Leave a Reply

Your email address will not be published. Required fields are marked *