Cyber
Glossary
APPLICATION SECURITY: A set of practices and measures to secure the development, deployment, and use of software applications against vulnerabilities and attacks.
AUTHENTICATION: The process of verifying the identity of a user or computer system, often through the use of passwords, authentication tokens, or biometric technologies.
CRYPTOGRAPHY: The science of encrypting and decrypting data to ensure its confidentiality, integrity, and authenticity when stored, transmitted, or processed over computer networks.
CYBER THREAT: A potential threat or malicious attack targeting computer systems, networks, or data to cause damage, steal sensitive information, or disrupt operations.
CYBERSECURITY: A set of practices, technologies, and processes designed to protect computer systems, networks, data, and users from cyber threats.
DATA PROTECTION: A set of measures and policies designed to ensure the confidentiality, integrity, and availability of sensitive data by ensuring its secure storage, transmission, and processing.
DENIAL OF SERVICE ATTACK (DDoS): A type of attack that overwhelms a server, network, or online service with excessive traffic, making the service unavailable to legitimate users.
INTRUSION: Unauthorized access to a computer system, network, or sensitive data by malicious individuals, often for the purpose of stealing information or causing damage.
FIREWALL: A network security device designed to monitor and control incoming and outgoing traffic between a private network and the Internet, blocking or allowing traffic based on predefined rules.
MALWARE: A computer program designed to damage, disrupt, or steal data on a computer system, including viruses, worms, Trojan horses, ransomware, and so on.
NETWORK SECURITY: A set of practices and technologies designed to secure computer networks from cyber threats, protecting data as it travels and controlling access to network resources.
RISK ANALYSIS: A systematic process for identifying, assessing, and prioritizing potential security risks to computer systems, networks, or data, with a view to taking appropriate action to mitigate them.
SECURITY CERTIFICATION: The process of evaluating and validating the compliance of a computer system, application, or product with established security standards, often performed by independent agencies.
SOCIAL ENGINEERING: A technique used by cyber criminals to manipulate or deceive users into obtaining confidential information or engaging them in malicious activity, often through phishing or identity theft.
VULNERABILITY MANAGEMENT: A process for identifying, assessing, and mitigating potential vulnerabilities in computer systems, applications, or networks to reduce the risk of exploitation through cyber attacks.