3
With high profile hacking attacks making news worldwide, keeping tabs on the latest cybersecurity trends is an important task for SMEs doing business over the Web – which, in this day and age, is just about every company. To help you stay abreast of developments in the field, we’ve illustrated 10 of the most commonly used cybersecurity terms. 10 CYBERSECURITY TERMS YOU NEED TO KNOW

10 Cybersecurity Terms You Need To Know

Embed Size (px)

Citation preview

Page 1: 10 Cybersecurity Terms You Need To Know

With high profile hacking attacks making news worldwide, keeping tabs on the latest cybersecurity trends is an important task for SMEs doing business over the Web – which, in this day and age, is just about every company. To help you stay abreast of developments in the field, we’ve illustrated 10 of the most commonly used cybersecurity terms.

10CYBERSECURITY TERMS YOU NEED TO KNOW

Page 2: 10 Cybersecurity Terms You Need To Know

Malware can refer to a variety of different types of malicious programs, including adware, Trojans, spyware,

ransomware, and more.

Keylogger software of this type functions by recording keystrokes and internet browsing data. This is then transmitted to a 3rd party who may

use it for nefarious purposes.

Phishing occurs when cyber criminals attempt

to fool people into providing vital information, such as passwords and account numbers, by sending them emails

that appear to come from a legitimate source.

01

03

05

02

04

Malware

Keylogger

Phishing

Trojan

Penetration testing

Trojans are usually distributed via emails, or downloads. When

the software is installed it provides entry for malicious

actors who steal your data or impede

the functioning of your computer.

Penetration testing involves engaging an outside IT security

firm or a “white hat” hacker to see if

they can gain entry to your system. To

be performed on an annual basis.

Page 3: 10 Cybersecurity Terms You Need To Know

333 Latimer Rd, London W10 6RA | 020 3031 9500

[email protected]

Anti-virus software can protect your

system from known threats. However, a particularly nasty form of malware involves zero-day exploits, or an exploit

which has not been used previously.

Adware infections result in the propagation of unwanted advertisements on your computer. These often consist of pop-up ads that appear

over and over until the software is removed.

A distributed denial of service occurs when a

server is overwhelmed with access requests and becomes unable to function properly. Attacks of this type are often used for

political purposes or by hackers.

06

08

10

07

09

Zero-day exploit

Adware

DDoS

Encryption

Social Engineering

Data encryption makes your data invulnerable to being deciphered by anyone without

the encryption key. Be cautious when sending sensitive

data that isn’t encrypted over the

Internet.

Phishing is one form of social engineering; another is calling a help desk or other company resource whilst pretending to be someone authorised to gain access to valuable information or resources.